Last update:
Thu Aug 1 11:55:23 MDT 2019
G. J. Holzmann The model checker SPIN . . . . . . . . . 279--295
T. L. Roberts and M. L. Gibson and K. T. Fields and R. K. Rainer Factors that impact implementing a system development methodology . . . . . 640--649
J. Rushby Systematic formal verification for fault-tolerant time-triggered algorithms 651--660
C. Sauer and D. R. Jeffery and L. Land and P. Yetton The effectiveness of software development technical reviews: a behaviorally motivated program of research . . . . . . . . . . . . . . . . 1--14 N. G. Leveson Intent specifications: an approach to building human-centered specifications 15--35 A. Bobbio and A. Puliafito and M. Tekel A modeling framework to implement preemption policies in non-Markovian SPNs . . . . . . . . . . . . . . . . . . 36--54 S. Antoy and D. Hamlet Automatically checking an implementation against its formal specification . . . . 55--69 N. Medvidovic and R. N. Taylor A classification and comparison framework for software architecture description languages . . . . . . . . . 70--93 Anonymous 1999 reviewers list . . . . . . . . . . 94--96
J. Ropponen and K. Lyytinen Components of software development risk: how to address them? A project manager survey . . . . . . . . . . . . . . . . . 98--112 I. Lee and R. K. Iyer Diagnosing rediscovered software problems using symptoms . . . . . . . . 113--127 P. S. Pietro and A. Morzenti and S. Morasca Generation of execution sequences for modular time critical systems . . . . . 128--149 B. Mahony and Jin Song Dong Timed Communicating Object Z . . . . . . 150--177 P. T. Devanbu and S. G. Stubblebine Cryptographic verification of test coverage claims . . . . . . . . . . . . 178--192
D. Talia and P. K. Srimani and M. Jazayeri Guest Editors' introduction: special issues on architecture-independent languages and software tools for parallel processing . . . . . . . . . . 193--196 B. L. Chamberlain and Sung-Eun Choi and C. Lewis and C. Lin and L. Snyder and W. D. Weathersby ZPL: a machine independent programming language for parallel computers . . . . 197--211 S. B. Baden and S. J. Fink A programming methodology for dual-tier multicomputers . . . . . . . . . . . . . 212--226 T. Braunl Parallaxis-III: architecture-independent data parallel processing . . . . . . . . 227--243 Junjie Gu and Zhiyuan Li Efficient interprocedural array data-flow analysis for automatic program parallelization . . . . . . . . . . . . 244--261 A. Marongiu and P. Palazzari Automatic mapping of system of $N$-dimensional affine recurrence equations (SARE) onto distributed memory parallel systems . . . . . . . . . . . . 262--275 S. Gorlatch Toward formally-based design of message passing programs . . . . . . . . . . . . 276--288
D. Talia and P. K. Srimani and M. Jazayeri Guest Editors' introduction: special issues on architecture-independent languages and software tools for parallel processing . . . . . . . . . . 289--292 L. S. Nyland and J. F. Prins and A. Goldberg and P. H. Mills A design methodology for data-parallel applications . . . . . . . . . . . . . . 293--314 T. Rauber and G. Runger A transformation approach to derive efficient parallel implementations . . . 315--339 D. Kadamuddi and J. J. P. Tsai Clustering algorithm for parallelizing software systems in multiprocessors environment . . . . . . . . . . . . . . 340--361 Ying Chen and M. Winslett Automated tuning of parallel I/O systems: an approach to portable I/O performance for scientific applications 362--383
S. Prakash and E. Deelman and R. Bagrodia Asynchronous parallel simulation of parallel programs . . . . . . . . . . . 385--400 M. D. Grammatikakis and S. Liesche Priority queues and sorting methods for parallel simulation . . . . . . . . . . 401--422 P. T. Devanbu and D. E. Perry and J. S. Poulin Guest Editors introduction: next generation software reuse . . . . . . . 423--424 K. Maruyama and K. I. Shima An automatic class generation mechanism by using method integration . . . . . . 425--440 D. Batory and Gang Chen and E. Robertson and Tao Wang Design wizards and visual programming environments for GenVoca generators . . 441--452 I. Kang and I. Lee and Young-Si Kim An efficient state space generation for the analysis of real-time systems . . . 453--477 T. Bergin Sloan research project . . . . . . . . . 478--478
M. G. Mendonca and V. R. Basili Validation of an approach for improving existing measurement frameworks . . . . 484--499 S. A. DeLoach and T. C. Hartrum A theory-based representation for object-oriented domain models . . . . . 500--517 L. C. Briand and K. El Emam and B. G. Freimut and O. Laitenberger A comprehensive evaluation of capture-recapture models for estimating software defect content . . . . . . . . 518--540 K. El Emam and A. Birk Validating the ISO/IEC 15504 measure of software requirements analysis process capability . . . . . . . . . . . . . . . 541--566 Miyoung Shin and A. L. Goel Empirical data modeling in software engineering using radial basis functions 567--576
H. Bowman and J. Derrick and E. Brinksma Selected papers from the second IFIP Int'l conference on formal methods for open object based distributed systems, 1997 . . . . . . . . . . . . . . . . . . 577--578 J. M. Wing and J. Ockerbloom Respectful type converters . . . . . . . 579--593 T. Bolognesi Toward constraint-object-oriented development . . . . . . . . . . . . . . 594--616 P. di Blasio and K. Fisher and C. Talcott A control-flow analysis for a calculus of concurrent objects . . . . . . . . . 617--634 D. Buchs and N. Guelfi A formal specification framework for object-oriented distributed systems . . 635--652 T. L. Graves and A. F. Karr and J. S. Marron and H. Siy Predicting fault incidence using software change history . . . . . . . . 653--661 R. Boute Supertotal function definition in mathematics and software engineering . . 662--672
J. M. Wing and J. Woodcock Special issues for FM '99: the First World Congress on Formal Methods in the Development of Computing Systems . . . . 673--674 S. King and J. Hammond and R. Chapman and A. Pryor Is proof more cost-effective than testing? . . . . . . . . . . . . . . . . 675--686 A. E. Haxthausen and J. Peleska Formal development and verification of a distributed railway control system . . . 687--701 V. Lotz and V. Kessler and G. H. Walter A formal security model for microprocessor hardware . . . . . . . . 702--712 A. Cavalcanti and D. A. Naumann A weakest precondition semantics for refinement of object-oriented programs 713--728 H. Marchand and M. Samaan Incremental design of a power transformer station controller using a controller synthesis methodology . . . . 729--741 M. Peleg and D. Dori The model multiplicity problem: experimenting with real-time specification methods . . . . . . . . . 742--759 F. Casati and S. Castano and M. Fugini and I. Mirbel and B. Pernici Using patterns to design rules in workflows . . . . . . . . . . . . . . . 760--785 M. Cartwright and M. Shepperd An empirical investigation of an object-oriented software system . . . . 786--796 N. E. Fenton and N. Ohlsson Quantitative analysis of faults and failures in a complex software system 797--814
D. E. Perry and A. Romanovsky and A. Tripathi Current trends in exception handling . . 817--819 P. A. Buhr and W. Y. R. Mok Advanced exception handling mechanisms 820--836 P. Koopman and J. DeVale The exception handling effectiveness of POSIX operating systems . . . . . . . . 837--848 S. Sinha and M. J. Harrold Analysis and testing of programs with exception handling constructs . . . . . 849--871 E. Borger and W. Schulte A practical method for specification and analysis of exception handling --- a Java/JVM case study . . . . . . . . . . 872--887 R. A. Maxion and R. T. Olszewski Eliminating exception handling errors with dependability cases: a comparative, empirical study . . . . . . . . . . . . 888--906 T. Chavez A decision-analytic stopping rule for validation of commercial software systems . . . . . . . . . . . . . . . . 907--918
D. E. Perry and A. Romanovsky and A. Tripathi Current trends in exception handling . . 921--922 M. Burnett and A. Agrawal and P. van Zee Exception handling in the spreadsheet paradigm . . . . . . . . . . . . . . . . 923--942 C. Hagen and G. Alonso Exception handling in workflow management systems . . . . . . . . . . . 943--958 T. Murata and A. Borgida Handling of irregularities in human centered systems: a unified framework for data and processes . . . . . . . . . 959--977 A. van Lamsweerde and E. Letier Handling obstacles in goal-oriented requirements engineering . . . . . . . . 978--1005 J. J. Dolado A validation of the component-based method for software size estimation . . 1006--1021 B. Littlewood The use of proof in diversity arguments 1022--1023
A. M. K. Cheng and P. Clements and M. Woodside Guest Editors' introduction: workshop on software and performance . . . . . . . . 1025--1026 Vikram S. Adve and Rajive L. Bagrodia and James C. Browne and Ewa Deelman and Aditya Dube and Elias N. Houstis and John R. Rice and Rizos Sakellariou and David J. Sundaram-Stukel and Patricia J. Teller and Mary K. Vernon POEMS: End-to-End Performance Design of Large Parallel Adaptive Computational Systems . . . . . . . . . . . . . . . . 1027--1048 D. Petriu and C. Shousha and A. Jalnapurkar Architecture-based performance analysis applied to a telecommunication system 1049--1065 D. A. Menasce and H. Gomaa A method for design and performance modeling of client/server systems . . . 1066--1085 Sridhar Ramesh and H. G. Perros A multilayer client-server queueing network model with synchronous and asynchronous messages . . . . . . . . . 1086--1100 F. Shull and F. Lanubile and V. R. Basili Investigating reading techniques for object-oriented framework learning . . . 1101--1118
A. M. K. Cheng and P. Clements and M. Woodside Workshop on software and performance [Guest Editors' Introduction] . . . . . 1121--1121 B. A. Nixon Management of performance requirements for information systems . . . . . . . . 1122--1146 E. J. Weyuker and F. I. Vokolos Experience with performance testing of software systems: issues, an approach, and case study . . . . . . . . . . . . . 1147--1156 B. Littlewood and P. T. Popov and L. Strigini and N. Shryane Modeling the effects of combining diverse software fault detection techniques . . . . . . . . . . . . . . . 1157--1167 M. Litoiu and J. Rolia and G. Serazzi Designing process replication and activation: a quantitative approach . . 1168--1178 C. G. Drummond and D. Ionescu and R. C. Holte A learning agent that assists the browsing of software libraries . . . . . 1179--1196 D. Malkhi and M. K. Reiter Secure execution of Java applets using a remote playground . . . . . . . . . . . 1197--1209
S. G. Eick and T. L. Graves and A. F. Karr and J. S. Marron and A. Mockus Does code decay? Assessing the evidence from change management data . . . . . . 1--12 D. Makaroff and G. Neufeld and N. Hutchinson Design and implementation of a VBR continuous media file server . . . . . . 13--28 R. Guerraoui and A. Schiper The generic consensus service . . . . . 29--41 M. Broy Toward a mathematical foundation of software engineering methods . . . . . . 42--57 B. Ramesh and M. Jarke Toward reference models for requirements traceability . . . . . . . . . . . . . . 58--93 Anonymous 2000 reviewers list . . . . . . . . . . 94--96
J. Kramer and D. Garlan and D. S. Rosenblum Guest Editors' introduction: 1999 international conference on software engineering . . . . . . . . . . . . . . 97--98 M. D. Ernst and J. Cockrell and W. G. Griswold and D. Notkin Dynamically discovering likely program invariants to support program evolution 99--123 R. DeLine Avoiding packaging mismatch with flexible packaging . . . . . . . . . . . 124--143 A. M. Memon and M. E. Pollack and M. L. Soffa Hierarchical GUI test case generation using automated planning . . . . . . . . 144--155 D. Jackson and A. Waingold Lightweight extraction of object models from bytecode . . . . . . . . . . . . . 156--169 W. Chan and R. J. Anderson and P. Beame and D. H. Jones and D. Notkin and W. E. Warner Optimizing symbolic model checking for statecharts . . . . . . . . . . . . . . 170--190
I-Ling Yen and F. B. Bastani and D. J. Taylor Design of multi-invariant data structures for robust shared accesses in multiprocessor systems . . . . . . . . . 193--207 R. Mattolini and P. Nesi An interval logic for real-time system specification . . . . . . . . . . . . . 208--227 M. E. Delamaro and J. C. Maidonado and A. P. Mathur Interface Mutation: an approach for integration testing . . . . . . . . . . 228--247 M. J. Harrold and D. Rosenblum and G. Rothermel and E. Weyuker Empirical studies of a prediction model for regression test selection . . . . . 248--263 R. K. Smith and J. E. Hale and A. S. Parrish An empirical study using task assignment patterns to improve the accuracy of software effort estimation . . . . . . . 264--271 L. J. Camp An atomicity-generating protocol for anonymous currencies . . . . . . . . . . 272--278 S. B. Yadav and N. G. Shaw and L. Webb and C. Sutcu and T. L. Roberts and M. L. Gibson and R. K. Rainer and K. T. Fields Comments on ``Factors that impact implementing a system development methodology'' [with reply] . . . . . . . 279--286 T. L. Roberts and M. L. Gibson and R. K. Rainer and K. T. Fields Response to ``Comments on factors that impact the implementation of a systems development methodology'' . . . . . . . 282--286
K. Zhang and D. Q. Zhang and J. Cao Design, construction, and application of a generic visual language generation environment . . . . . . . . . . . . . . 289--307 O. Babaoglu and R. Davoli and A. Montresor Group communication in partitionable systems: specification and algorithms 308--336 T. E. Hastings and A. S. M. Sajeev A vector-based approach to software size measurement and effort estimation . . . 337--350 P. Tonella Concept analysis for module restructuring . . . . . . . . . . . . . 351--363 G. C. Murphy and D. Notkin and K. J. Sullivan Software reflexion models: bridging the gap between design and implementation 364--380 Gursaran and G. Roy On the applicability of Weyuker Property 9 to object-oriented structural inheritance complexity metrics . . . . . 381--384
A. A. Andrews Editorial . . . . . . . . . . . . . . . 385--386 O. Laitenberger and K. El Emam and T. G. Harbich An internally replicated quasi-experimental comparison of checklist and perspective based reading of code documents . . . . . . . . . . . 387--421 E. Y. T. Juan and J. J. P. Tsai and T. Murata and Yi Zhou Reduction methods for real-time systems using Delay Time Petri Nets . . . . . . 422--448 S. Gilmore and J. Hillston and M. Ribaudo An efficient algorithm for aggregating PEPA models . . . . . . . . . . . . . . 449--464 L. Prechelt and B. Unger An experiment measuring the effects of personal software process (PSP) training 465--472 G. Succi and L. Benedicenti and T. Vernazza Analysis of the effects of software reuse on customer satisfaction in an RPG environment . . . . . . . . . . . . . . 473--479
R. Chatterjee and B. G. Ryder and W. A. Landi Complexity of points-to analysis of Java in the presence of exceptions . . . . . 481--512 L. C. Briand and C. Bunse and J. W. Daly A controlled experiment for evaluating quality guidelines on the maintainability of object-oriented designs . . . . . . . . . . . . . . . . 513--530 D. M. Silva and K. Schwan and G. Eisenhauer CTK: configurable object abstractions for multiprocessors . . . . . . . . . . 531--549 P. Diaz and I. Aedo and F. Panetsos Modeling the dynamic behavior of hypermedia applications . . . . . . . . 550--572 Ki-Seok Bang and Jin-Young Choi and Chuck Yoo Comments on ``The Model Checker SPIN'' 573--576 R. DeLine Corrections to ``Avoiding packaging mismatch with flexible packaging'' . . . 577--577
R. Janicki and E. Sekerinski Foundations of the trace assertion method of module interface specification 577--598 D. A. Stuart and M. Brockmeyer and A. K. Mok and F. Jahanian Simulation-verification: biting at the state explosion problem . . . . . . . . 599--617 Hyeonsang Eom and J. K. Hollingsworth A tool to help tune where computation is performed . . . . . . . . . . . . . . . 618--629 K. El Emam and S. Benlarbi and N. Goel and S. N. Rai The confounding effect of class size on the validity of object-oriented metrics 630--650 M. Chechik and J. Gannon Automatic analysis of consistency between requirements and designs . . . . 651--672
L. L. Jilani and J. Desharnais and A. Mili Defining and applying measures of distance between specifications . . . . 673--703 S. Alagar and S. Venkatesan Techniques to tackle state explosion in global predicate detection . . . . . . . 704--714 Shyh-Kwei Chen and W. K. Fuchs and Jen-Yao Chung Reversible debugging using program instrumentation . . . . . . . . . . . . 715--727 E. Vicario Static analysis and dynamic steering of time-dependent systems . . . . . . . . . 728--748 K. Havelund and M. Lowry and J. Penix Formal analysis of a space-craft controller using SPIN . . . . . . . . . 749--765 P. Diaz and I. Aedo and F. Panetsos Call for papers . . . . . . . . . . . . 766--767
I. Ben-Shaul and O. Holder and B. Lavva Dynamic adaptation and deployment of distributed components in Hadas . . . . 769--787 B. A. Kitchenham and R. T. Hughes and S. G. Linkman Modeling software measurement data . . . 788--804 Chang-Gun Lee and Kwangpo Lee and Joosun Hahn and Yang-Min Seo and Sang Lyul Min and Rhan Ha and Seongsoo Hong and Chang Yun Park and Minsuk Lee and Chong Sang Kim Bounding cache-related preemption delay for real-time systems . . . . . . . . . 805--826 G. Cugola and E. Di Nitto and A. Fuggetta The JEDI event-based infrastructure and its application to the development of the OPSS WFMS . . . . . . . . . . . . . 827--850 K. El Emam and O. Laitenberger Evaluating capture-recapture models with two inspectors . . . . . . . . . . . . . 851--864
C. Nottegar and C. Priami and P. Degano Performance evaluation of mobile processes via abstract machines . . . . 867--889 K. Strike and K. El Emam and N. Madhavji Software cost estimation with incomplete data . . . . . . . . . . . . . . . . . . 890--908 K. M. Zuberi and K. G. Shin EMERALDS: a small-memory real-time microkernel . . . . . . . . . . . . . . 909--928 G. Rothermel and R. H. Untch and Chengyun Chu and M. J. Harrold Prioritizing test cases for regression testing . . . . . . . . . . . . . . . . 929--948 S. C. Ntafos On comparisons of random, partition, and proportional partition testing . . . . . 949--960
C. Wohlin Guest Editor's introduction: Seventh International Software Metrics Symposium 961--962 L. C. Briand and J. Wust Modeling development effort in object-oriented systems using design properties . . . . . . . . . . . . . . . 963--986 M. Shepperd and M. Cartwright Predicting with sparse data . . . . . . 987--998 I. Myrtveit and E. Stensrud and U. H. Olsson Analyzing data sets with missing data: an empirical evaluation of imputation methods and likelihood-based methods . . 999--1013 M. Shepperd and G. Kadoda Comparing software prediction techniques using simulation . . . . . . . . . . . . 1014--1022 C. Kallepalli and J. Tian Measuring and modeling usage and reliability for statistical Web testing 1023--1036 S. Iyer and S. Ramesh Apportioning: a technique for efficient reachability analysis of concurrent object-oriented programs . . . . . . . . 1037--1056
N. E. Rallis and Z. F. Lansdowne Reliability estimation for a software system with sequential independent reviews . . . . . . . . . . . . . . . . 1057--1061 F. Fioravanti and P. Nesi Estimation and prediction metrics for adaptive maintenance effort of object-oriented systems . . . . . . . . 1062--1084 C. C. Michael and G. McGraw and M. A. Schatz Generating software test data by evolution . . . . . . . . . . . . . . . 1085--1110 B. Westfechtel and B. P. Munch and R. Conradi A layered architecture for uniform version management . . . . . . . . . . . 1111--1133 L. Prechelt and B. Unger and W. F. Tichy and P. Brossler and L. G. Votta A controlled experiment in maintenance: comparing design patterns to simpler solutions . . . . . . . . . . . . . . . 1134--1144 Anonymous Author index . . . . . . . . . . . . . . 1145--1147 Anonymous Subject index . . . . . . . . . . . . . 1147--1151
A. A. Andrews Editorial: New EIC Introduction . . . . 1--1 J. Knight Editorial . . . . . . . . . . . . . . . 3--3 J. Bansiya and C. G. Davis A hierarchical model for object-oriented design quality assessment . . . . . . . 4--17 Hui Wu and Wei-Ngan Chin and J. Jaffar An efficient distributed deadlock avoidance algorithm for the AND model 18--29 B. Ravindran Engineering dynamic real-time distributed systems: architecture, system description language, and middleware . . . . . . . . . . . . . . . 30--57 P. Frey and R. Radhakrishnan and H. W. Carter and P. A. Wilsey and P. Alexander A formal specification and verification framework for Time Warp-based parallel simulation . . . . . . . . . . . . . . . 58--78 A. van der Hoek and A. Carzaniga and D. Heimbigner and A. L. Wolf A testbed for configuration management policy programming . . . . . . . . . . . 79--99 P. T. Devanbu and S. G. Stubblebine Stack and queue integrity on hostile platforms . . . . . . . . . . . . . . . 100--108 Kuo-Chung Tai and Yu Lei A test generation strategy for pairwise testing . . . . . . . . . . . . . . . . 109--111
M. J. Harrold and A. Bertolino Guest Editors' Introduction: 2000 International Symposium on Software Testing and Analysis . . . . . . . . . . 113--114 S. F. Siegel and G. S. Avrunin Improving the precision of INCA by eliminating solutions with spurious cycles . . . . . . . . . . . . . . . . . 115--128 K. Bhargavan and C. A. Gunter and Moonjoo Kim and Insup Lee and D. Obradovic and O. Sokolsky and M. Viswanathan Verisim: formal analysis of network simulations . . . . . . . . . . . . . . 129--145 D. K. Peters and D. L. Parnas Requirements-based monitors for real-time systems . . . . . . . . . . . 146--158 S. Elbaum and A. G. Malishevsky and G. Rothermel Test case prioritization: a family of empirical studies . . . . . . . . . . . 159--182 A. Zeller and R. Hildebrandt Simplifying and isolating failure-inducing input . . . . . . . . . 183--200 M. G. Gouda Multiphase stabilization . . . . . . . . 201--208
Wuu Yang A classification of noncircular attribute grammars based on the look-ahead behavior . . . . . . . . . . 210--227 K. L. Mills and H. Gomaa Knowledge-based automation of a design method for concurrent systems . . . . . 228--255 S. G. Stubblebine and R. N. Wright An authentication logic with formal semantics supporting synchronization, revocation, and recency . . . . . . . . 256--285 E. Rosti and G. Serazzi and E. Smirni and M. S. Squillante Models of parallel applications with large computation and I/O requirements 286--307 A. E. K. Sobel and M. R. Clarkson Formal methods application: an empirical tale of software development . . . . . . 308--320
C. E. Hrischuk and C. M. Woodside Logical clock requirements for reverse engineering scenarios from a distributed system . . . . . . . . . . . . . . . . . 321--339 M. Morisio and M. Ezran and C. Tully Success and failure factors in software reuse . . . . . . . . . . . . . . . . . 340--357 J. Rajgopal and M. Mazumdar Modular operational test plans for inferences on software reliability based on a Markov model . . . . . . . . . . . 358--363 G. J. Holzmann and M. H. Smith An automated verification method for distributed systems software based on model extraction . . . . . . . . . . . . 364--377 S. Frolund and R. Guerraoui e-Transactions: end-to-end reliability for three-tier architectures . . . . . . 378--395 S. G. Eick and T. L. Graves and A. F. Karr and A. Mockus and P. Schuster Visualizing software changes . . . . . . 396--412 D. Milicev Automatic model transformations using extended UML object diagrams in modeling environments . . . . . . . . . . . . . . 413--431 J. Offutt and J. Jezequel Call for papers . . . . . . . . . . . . 432--432
A. L. Murphy and G. C. Roman and G. Varghese Tracking mobile units for dependable message delivery . . . . . . . . . . . . 433--448 T. Mens A state-of-the-art survey on software merging . . . . . . . . . . . . . . . . 449--462 D. Hendrix and J. H. Cross and S. Maghsoodloo The effectiveness of control structure diagrams in source code comprehension activities . . . . . . . . . . . . . . . 463--477 N. Stankovic and Kang Zhang A distributed parallel programming framework . . . . . . . . . . . . . . . 478--493 K. El Emam and S. Benlarbi and N. Goel and W. Melo and H. Lounis and S. N. Rai The optimal class size for object-oriented software . . . . . . . . 494--509 D. A. Wooff and M. Goldstein and F. P. A. Coolen Bayesian graphical models for software testing . . . . . . . . . . . . . . . . 510--525 Lu Zhang and Dan Xie Comments on ``On the applicability of Weyuker property 9 to object-oriented structural inheritance complexity metrics'' . . . . . . . . . . . . . . . 526--527
S. M. Yacoub and H. H. Ammar A methodology for architecture-level reliability risk analysis . . . . . . . 529--547 P. S. C. Alencar and D. D. Cowan and C. J. P. Lucena A logical theory of interfaces and objects . . . . . . . . . . . . . . . . 548--575 M. Burnett and A. Sheretov and Bing Ren and G. Rothermel Testing homogeneous spreadsheet grids with the ``what you see is what you test'' methodology . . . . . . . . . . . 576--594 L. Prechelt and B. Unger-Lamprecht and M. Philippsen and W. F. Tichy Two controlled experiments assessing the usefulness of design pattern documentation in program maintenance . . 595--606 P. V. Koppol and R. H. Carver and Kuo-Chung Tai Incremental integration testing of concurrent programs . . . . . . . . . . 607--623 D. Hendrix and J. H. Cross and S. Maghsoodloo Corrections to ``The effectiveness of control structure diagrams in source code comprehension activities'' . . . . 624--624
D. L. Atkins and T. Ball and T. L. Graves and A. Mockus Using version control data to evaluate the impact of software tools: a case study of the Version Editor . . . . . . 625--637 L. Dobrica and E. Niemela A survey on software architecture analysis methods . . . . . . . . . . . . 638--653 T. Kamiya and S. Kusumoto and K. Inoue CCFinder: a multilinguistic token-based code clone detection system for large scale source code . . . . . . . . . . . 654--670 S. D. Teasley and L. A. Covi and M. S. Krishnan and J. S. Olson Rapid software development through team collocation . . . . . . . . . . . . . . 671--683 V. S. Mookerjee and I. R. Chiang A dynamic coordination policy for software system construction . . . . . . 684--694 D. E. Perry and A. Porter and M. W. Wade and L. G. Votta and J. Perpich Reducing inspection interval in large-scale software development . . . . 695--705 L. C. Briand and W. L. Melo and J. Wust Assessing the applicability of fault-proneness models across object-oriented software projects . . . 706--720
B. A. Kitchenham and S. L. Pfleeger and L. M. Pickard and P. W. Jones and D. C. Hoaglin and K. El Emam and J. Rosenberg Preliminary guidelines for empirical research in software engineering . . . . 721--734 C. S. Collberg and C. Thomborson Watermarking, tamper-proofing, and obfuscation --- tools for software protection . . . . . . . . . . . . . . . 735--746 B. H. C. Cheng and E. Y. Wang Formalizing and integrating the dynamic model for object-oriented modeling . . . 747--762 C. A. Healy and D. B. Whalley Automatic detection and exploitation of branch constraints for timing analysis 763--781 J. W. Cangussu and R. A. DeCarlo and A. P. Mathur A formal model of the software test process . . . . . . . . . . . . . . . . 782--796 G. Mori and F. Paterno and C. Santoro CTTE: support for developing and analyzing task models for interactive system design . . . . . . . . . . . . . 797--813 W. M. Turski The reference model for smooth growth of software systems revisited . . . . . . . 814--815
F. Kordon and Luqi An introduction to rapid system prototyping . . . . . . . . . . . . . . 817--821 A. Baghdadi and N. E. Zergainoh and W. O. Cesario and A. A. Jerraya Combining a performance estimation methodology with a hardware/software codesign flow supporting multiprocessor systems . . . . . . . . . . . . . . . . 822--831 R. S. Janka and L. M. Wills and L. B. Baumstark Virtual benchmarking and model continuity in prototyping embedded multiprocessor signal processing systems 832--846 F. Barat and R. Lauwereins and G. Deconinck Reconfigurable instruction set processors from a hardware/software perspective . . . . . . . . . . . . . . 847--862 A. Gopal and M. S. Krishnan and T. Mukhopadhyay and D. R. Goldenson Measurement programs in software development: determinants of success . . 863--875 M. Morisio and D. Romano and I. Stamelos Quality, productivity, and learning in framework-based development: an exploratory case study . . . . . . . . . 876--888 D. Harel and O. Kupferman On object systems and behavioral inheritance . . . . . . . . . . . . . . 889--903 D. E. Neumann An enhanced neural network technique for software risk analysis . . . . . . . . . 904--912
G. Ciardo and R. German and B. R. Haverkort Introduction to the special section on Petri nets and performance models . . . 913--914 G. Balbo and S. C. Bruell and M. Sereno Product form solution for generalized stochastic Petri nets . . . . . . . . . 915--932 A. Horvath and M. Telek Time domain analysis of non-Markovian stochastic Petri nets with PRI transitions . . . . . . . . . . . . . . 933--943 M. Gribaudo and A. Horvath Fluid stochastic Petri nets augmented with flush-out arcs: a transient analysis technique . . . . . . . . . . . 944--955 D. D. Deavours and G. Clark and T. Courtney and D. Daly and S. Derisavi and J. M. Doyle and W. H. Sanders and P. G. Webster The Mobius framework and its implementation . . . . . . . . . . . . . 956--969 G. Antoniol and G. Canfora and G. Casazza and A. De Lucia and E. Merlo Recovering traceability links between code and documentation . . . . . . . . . 970--983 Dianxiang Xu and Xudong He and Yi Deng Compositional schedulability analysis of real-time systems using time Petri nets 984--996 J. Tian Better reliability assessment and prediction through data clustering . . . 997--1007
Jongmoon Baik and B. Boehm and B. M. Steece Disaggregating and calibrating the CASE tool variable in COCOMO II . . . . . . . 1009--1022 A. En-Nouaary and R. Dssouli and F. Khendek Timed Wp-method: testing real-time systems . . . . . . . . . . . . . . . . 1023--1038 G. Cabri and L. Leonardi and F. Zambonelli Engineering mobile agent applications via context-dependent coordination . . . 1039--1055 F. Plasil and S. Visnovsky Behavior protocols for software components . . . . . . . . . . . . . . . 1056--1076 Loon-Been Chen and I-Chen Wu An efficient distributed online algorithm to detect strong conjunctive predicates . . . . . . . . . . . . . . . 1077--1084 A. Khoumsi A temporal approach for testing distributed systems . . . . . . . . . . 1085--1103 Anonymous Author index . . . . . . . . . . . . . . 1194--1196 Anonymous Subject index . . . . . . . . . . . . . 1196--1200
L. C. Briand and S. Morasca and V. R. Basili An operational process for goal-driven definition of measures . . . . . . . . . 1106--1125 P. Jalote and A. Saxena Optimum control limits for employing statistical process control in software process . . . . . . . . . . . . . . . . 1126--1134 C. K. Riemenschneider and B. C. Hardgrave and F. D. Davis Explaining software developer acceptance of methodologies: a comparison of five theoretical models . . . . . . . . . . . 1135--1145 M. D. Ernst and G. J. Badros and D. Notkin An empirical analysis of c preprocessor use . . . . . . . . . . . . . . . . . . 1146--1170 J. Singer and N. G. Vinson Ethical issues in empirical studies of software engineering . . . . . . . . . . 1171--1180 L. Bratthall and C. Wohlin Is it possible to decorate graphical software design and architecture models with qualitative information? --- An experiment . . . . . . . . . . . . . . . 1181--1193 Anonymous Author index . . . . . . . . . . . . . . 1194--1196 Anonymous Subject index . . . . . . . . . . . . . 1196--1200
Fan Zhang and To-yat Cheung Optimal transfer trees and distinguishing trees for testing observable nondeterministic finite-state machines . . . . . . . . . . . . . . . . 1--14 Haiping Xu and S. M. Shatz A framework for model-based design of agent-oriented software . . . . . . . . 15--30 Dianxiang Xu and Jianwen Yin and Yi Deng and Junhua Ding A formal architectural model for logical agent mobility . . . . . . . . . . . . . 31--45 R. Lai and Sun-Jen Huang A model for estimating the size of a formal communication protocol specification and its implementation . . 46--62 Ping-Yu Hsu and Yuan-Bin Chang and Yen-Liang Chen STRPN: a Petri-net approach for modeling spatial-temporal relations between moving multimedia objects . . . . . . . 63--76 R. K. Bandi and V. K. Vaishnavi and D. E. Turk Predicting maintenance performance using object-oriented design complexity metrics . . . . . . . . . . . . . . . . 77--87 P. J. Boland and H. Singh and B. Cukic Comparing partition and random testing via majorization and Schur functions . . 88--94 Anonymous Reviewers list . . . . . . . . . . . . . 95--96
M. J. Harrold and W. Schafer Guest Editors' introduction: 2001 international conference on software engineering . . . . . . . . . . . . . . 97--98 S. Uchitel and J. Kramer and J. Magee Synthesis of behavioral models from scenarios . . . . . . . . . . . . . . . 99--115 A. Egyed A scenario-driven approach to trace dependency analysis . . . . . . . . . . 116--132 L. K. Dillon and R. E. K. Stirewalt Inference graphs: a computational structure supporting generation of customizable and correct analysis components . . . . . . . . . . . . . . . 133--150 A. I. Anton and C. Potts Functional paleontology: the evolution of user-visible system services . . . . 151--166 P. Vitharana and K. Ramamurthy Computer-mediated group support, anonymity, and the software inspection process: an empirical investigation . . 167--180 L. V. Manzoni and R. T. Price Identifying extensions required by RUP (rational unified process) to comply with CMM (capability maturity model) levels 2 and 3 . . . . . . . . . . . . . 181--192
G. Canfora and A. A. Andrews Guest Editors' introduction: 2001 international conference on software maintenance . . . . . . . . . . . . . . 193--194 J. A. Jones and M. J. Harrold Test-suite reduction and prioritization for modified condition/decision coverage 195--209 T. Eisenbarth and R. Koschke and D. Simon Locating features in source code . . . . 210--224 A. Bianchi and D. Caivano and V. Marengo and G. Visaggio Iterative reengineering of legacy systems . . . . . . . . . . . . . . . . 225--241 C. Canal and L. Fuentes and E. Pimentel and J. M. Troya and A. Vallecillo Adding roles to CORBA objects . . . . . 242--260 Chin-Yu Huang and M. R. Lyu and Sy-Yen Kuo A unified scheme of some nonhomogeneous Poisson process models for software reliability estimation . . . . . . . . . 261--269 A. Bobbio and G. Franceschinis and R. Gaeta and L. Portinale Parametric fault tree for the dependability analysis of redundant systems and its high-level Petri net semantics . . . . . . . . . . . . . . . 270--287 Chia Hung Kao Comments on ``Quality, productivity, and learning in framework-based development: an exploratory case study'' . . . . . . 288--288
R. G. Little and M. L. Gibson Perceived influences on implementing data warehousing . . . . . . . . . . . . 290--296 R. Subramanyam and M. S. Krishnan Empirical analysis of CK metrics for object-oriented design complexity: implications for software defects . . . 297--310 D. B. Stewart and G. Arora A tool for analyzing and fine tuning the real-time properties of an embedded system . . . . . . . . . . . . . . . . . 311--326 Sun-Jen Huang and R. Lai Measuring the maintainability of a communication protocol based on its formal specification . . . . . . . . . . 327--344 P. Popov and L. Strigini and J. May and S. Kuball Estimating bounds on the reliability of diverse systems . . . . . . . . . . . . 345--359 Songwen Xu and Yam San Chee Transformation-based diagnosis of student programs for programming tutoring systems . . . . . . . . . . . . 360--384
S. Biffl and M. Halling Investigating the defect detection effectiveness and cost benefit of nominal inspection teams . . . . . . . . 385--397 E. Stensrud and I. Myrtveit Identifying high performance ERP projects . . . . . . . . . . . . . . . . 398--416 S. J. Prowell and J. H. Poore Foundations of sequence-based software specification . . . . . . . . . . . . . 417--429 J. W. Cangussu and R. A. DeCarlo and A. P. Mathur Using sensitivity analysis to validate a state variable model of the software test process . . . . . . . . . . . . . . 430--443 A. T. Sherman and D. A. McGrew Key establishment in large dynamic groups using one-way function trees . . 444--458 F. Barbier and B. Henderson-Sellers and A. Le Parc-Lacayrelle and J. M. Bruel Formalization of the Whole-Part relationship in the Unified Modeling Language . . . . . . . . . . . . . . . . 459--470 Min Xie and Bo Yang A study of the effect of imperfect debugging on software development cost 471--473 T. Menzies and J. S. Di Stefano More success and failure factors in software reuse . . . . . . . . . . . . . 474--477 M. Morisio and M. Ezran and C. Tully Comments on ``More success and failure factors in software reuse'' . . . . . . 478
J. D. Herbsleb and A. Mockus An empirical study of speed and communication in globally distributed software development . . . . . . . . . . 481--494 P. Tonella Using a concept lattice of decomposition slices for program understanding and impact analysis . . . . . . . . . . . . 495--509 A. Santone Heuristic search + local model checking in selective mu-calculus . . . . . . . . 510--523 C. Baier and B. Haverkort and H. Hermanns and J. P. Katoen Model-checking algorithms for continuous-time Markov chains . . . . . 524--541 B. Kitchenham and L. M. Pickard and S. Linkman and P. W. Jones Modeling software bidding risks . . . . 542--554 B. Long and D. Hoffman and P. Strooper Tool support for testing concurrent Java components . . . . . . . . . . . . . . . 555--566 D. M. Berry and W. F. Tichy Comments on ``Formal methods application: an empirical tale of software development'' . . . . . . . . . 567--571 A. E. K. Sobel and M. R. Clarkson Response to ``Comments on `Formal methods application: an empirical tale of software development'' . . . . . . . 572--575 J. C. Chen and H. C. Jiau Comments on ``On object systems and behavioral inheritance'' . . . . . . . . 576
T. Y. Chen and Pak-Lok Poon and T. H. Tse A choice relation framework for supporting category-partition test case generation . . . . . . . . . . . . . . . 577--593 L. C. Briand and Y. Labiche and Yihong Wang An investigation of graph-based class integration test order strategies . . . 594--607 J. Villadangos and F. Farina and J. R. Gonzalez de Mendivil and J. R. Garitagoitia and A. Cordoba A safe algorithm for resolving OR deadlocks . . . . . . . . . . . . . . . 608--622 R. Alur and K. Etessami and M. Yannakakis Inference of message sequence charts . . 623--633 J. H. Andrews and Yingjun Zhang General test result checking with log file analysis . . . . . . . . . . . . . 634--648 P. Vitharana and F. M. Zahedi and H. Jain Knowledge-based repository scheme for storing and retrieving business components: a theoretical design and an empirical analysis . . . . . . . . . . . 649--664 J. J. Dolado and M. Harman and M. C. Otero and L. Hu An empirical investigation of the influence of a type of side effects on program comprehension . . . . . . . . . 665--670 W. M. Evanco Comments on ``The confounding effect of class size on the validity of object-oriented metrics'' . . . . . . . 670--672
D. L. Parnas and M. Lawford The role of inspection in software quality assurance . . . . . . . . . . . 674--676 A. Dunsmore and M. Roper and M. Wood The development and evaluation of three diverse techniques for object-oriented code inspection . . . . . . . . . . . . 677--686 T. Thelin and P. Runeson and C. Wohlin An experimental comparison of usage-based and checklist-based reading 687--704 J. Xu On inspection and verification of software with timing requirements . . . 705--720 P. Anderson and T. Reps and T. Teitelbaum Design and implementation of a fine-grained software inspection tool 721--733 Tei-Wei Kuo and Li-Pin Chang and Yu-Hua Liu and Kwei-Jay Lin Efficient online schedulability tests for real-time systems . . . . . . . . . 734--751 D. Mosse and R. Melhem and Sunondo Ghosh A nonpreemptive real-time scheduler with recovery from transient faults and its implementation . . . . . . . . . . . . . 752--767
T. Berling and P. Runeson Efficient evaluation of multifactor dependent system performance using fractional factorial design . . . . . . 769--781 M. Lanza and S. Ducasse Polymetric views --- a lightweight visual approach to reverse engineering 782--795 J. Cleland-Huang and C. K. Chang and M. Christensen Event-based traceability for managing evolutionary change . . . . . . . . . . 796--810 Ming Li and C. S. Smidts A ranking of software engineering measures based on expert opinion . . . . 811--824 M. A. Rothenberger and K. J. Dooley and U. R. Kulkarni and N. Nada Strategies for software reuse: a principal component analysis of reuse practices . . . . . . . . . . . . . . . 825--837 C. B. Seaman and M. G. Mendonca and V. R. Basili and Y. M. Kim User interface evaluation and empirically-based evolution of a prototype experience management tool . . 838--850 S. C. Shaw and M. Goldstein and M. Munro and E. Burd Moral dominance relations for program comprehension . . . . . . . . . . . . . 851--863
Anonymous Special Section --- On the International Conference on the Foundations of Software Engineering . . . . . . . . . . 0:1--0:2 W. G. Griswold Guest Editor's introduction: 2002 Conference on the Foundations of Software Engineering . . . . . . . . . . 865--865 Jianwei Niu and J. M. Atlee and N. A. Day Template semantics for model-based notations . . . . . . . . . . . . . . . 866--882 G. Bruns and S. Chandra Searching for points-to analysis . . . . 883--897 A. Gurfinkel and M. Chechik and B. Devereux Temporal logic query checking: a tool for model exploration . . . . . . . . . 898--914 Yichen Xie and D. Engler Using redundancies to find errors . . . 915--928 L. Capra and W. Emmerich and C. Mascolo CARISMA: context-aware reflective middleware system for mobile applications . . . . . . . . . . . . . . 929--945 K. Goseva-Popstojanova and A. Hassan and A. Guedem and W. Abdelmoez and D. E. M. Nassar and H. Ammar and A. Mili Architectural-level risk analysis using UML . . . . . . . . . . . . . . . . . . 946--960
J. Knight Editorial: New AEIC introduction and AE farewell . . . . . . . . . . . . . . . . 961--961 E. Teruel and G. Franceschinis and M. De Pierro Well-defined generalized stochastic Petri nets: a net-level method to specify priorities . . . . . . . . . . . 962--973 M. Marre and A. Bertolino Using spanning sets for coverage testing 974--984 T. Foss and E. Stensrud and B. Kitchenham and I. Myrtveit A simulation study of the model evaluation criterion MMRE . . . . . . . 985--995 Skylar Lei and M. R. Smith Evaluation of several nonparametric bootstrap methods to estimate confidence intervals for software metrics . . . . . 996--1004 A. L. Souter and L. L. Pollock The construction of contextual def-use associations for object-oriented systems 1005--1018 D. Spinellis Global analysis and transformations in preprocessed languages . . . . . . . . . 1019--1030 M. W. Bailey and J. W. Davidson Automatic detection and diagnosis of faults in generated code for procedure calls . . . . . . . . . . . . . . . . . 1031--1042 M. Alshayeb and Wei Li An empirical validation of object-oriented metrics in two different iterative software processes . . . . . . 1043--1049 A. Chatzigeorgiou Mathematical assessment of object-oriented design quality . . . . . 1050--1053 Hee Beng Kuan Tan and Lun Hao and Yong Yang On formalization of the whole-part relationship in the Unified Modeling Language . . . . . . . . . . . . . . . . 1054--1055 F. Barbier and B. Henderson-Sellers Controversies about the black and white diamonds . . . . . . . . . . . . . . . . 1056
M. Morisio and M. Oivo Guest Editors' introduction: software engineering for the wireless Internet 1057--1058 M. Caporuscio and A. Carzaniga and A. L. Wolf Design and evaluation of a support service for mobile, wireless publish/subscribe applications . . . . . 1059--1071 A. T. S. Chan and Siu-Nam Chuang MobiPADS: a reflective middleware for context-aware mobile computing . . . . . 1072--1085 P. Bellavista and A. Corradi and R. Montanari and C. Stefanelli Context-aware middleware for resource management in the wireless Internet . . 1086--1099 Wai Yip Lum and F. C. M. Lau User-centric content negotiation for effective adaptation service in mobile computing . . . . . . . . . . . . . . . 1100--1111 I. Satoh A testing framework for mobile computing software . . . . . . . . . . . . . . . . 1112--1121 A. Ocampo and D. Boggio and J. Munch and G. Palladino Toward a reference process for developing wireless Internet services 1122--1134 Anonymous Author index . . . . . . . . . . . . . . 1135--1137 Anonymous Subject index . . . . . . . . . . . . . 1137--1142
Anonymous \booktitleIEEE Transactions on Software Engineering --- Staff List . . . . . . . 0:2--0:2 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of Contents . . . 0:1--0:1 T. Ball and M. Chechik and D. Hoffman Editorial: AE introduction . . . . . . . 1--2 M. Harman and L. Hu and R. Hierons and J. Wegener and H. Sthamer and A. Baresel and M. Roper Testability transformation . . . . . . . 3--16 F. Padberg and T. Ragg and R. Schoknecht Using machine learning for estimating the defect content after an inspection 17--28 A. Petrenko and S. Boroday and R. Groz Confirming configurations in EFSM testing . . . . . . . . . . . . . . . . 29--42 G. Antoniol and A. Cimitile and G. A. Di Lucca and M. Di Penta Assessing staffing needs for a software maintenance project through queuing simulation . . . . . . . . . . . . . . . 43--58 Gwan-Hwan Hwang and Sheng-Jen Chang and Huey-Der Chu Technology for testing nondeterministic client/server database applications . . 59--77 Anonymous 2003 Reviewers list . . . . . . . . . . 78--80 Anonymous TSE: Information for authors . . . . . . 81--81 Anonymous IEEE Computer Society Information . . . 82--82
J. Knight Editorial: the state of TSE . . . . . . 81--81 B. C. Hungerford and A. R. Hevner and R. W. Collins Reviewing software diagrams: a cognitive study . . . . . . . . . . . . . . . . . 82--96 G. Bucci and A. Fedeli and L. Sassoli and E. Vicario Timed state space analysis of real-time preemptive systems . . . . . . . . . . . 97--111 Y. H. Lee and A. M. K. Cheng Optimizing real-time equational rule-based systems . . . . . . . . . . . 112--125 T. Mens and T. Tourwe A survey of software refactoring . . . . 126--139 D. Bojic and T. Eisenbarth and R. Koschke and D. Simon and D. Velasevic Addendum to ``Locating features in source code'' . . . . . . . . . . . . . 140 Anonymous Information for authors . . . . . . . . 141--141 Anonymous IEEE Computer Society Information to Authors . . . . . . . . . . . . . . . . 142--142 Anonymous \booktitleIEEE Transactions on Software Engineering --- Table of contents . . . C1--C1 Anonymous \booktitleIEEE Transactions on Software Engineering . . . . . . . . . . . . . . C2--C2
Anonymous IEEE Computer Society Staff List . . . . 0:2--0:2 Anonymous \booktitleIEEE Transactions on Software Engineering . . . . . . . . . . . . . . 0:1--0:1 T. C. Oliveira and I. M. Filho and C. J. P. de Lucena and P. S. C. Alencar and D. D. Cowan Software process representation and analysis for framework instantiation . . 145--159 H. Muccini and P. Inverardi and A. Bertolino Using software architecture for code testing . . . . . . . . . . . . . . . . 160--171 R. R. Lutz and I. C. Mikulski Empirical analysis of safety-critical anomalies during operations . . . . . . 172--180 C. Kirkegaard and A. Moller and M. I. Schwartzbach Static Analysis of XML Transformations in Java . . . . . . . . . . . . . . . . 181--192 R. B. France and D. K. Kim and Sudipto Ghosh and E. Song A UML-based pattern specification technique . . . . . . . . . . . . . . . 193--206 Anonymous Information for authors . . . . . . . . 207--207 Anonymous IEEE Computer Society Information . . . 208--208
Anonymous IEEE Computer Society's --- Staff List 0:2--0:2 Anonymous \booktitleIEEE Transactions on Software Engineering . . . . . . . . . . . . . . 0:1--0:1 M. Jorgensen Realism in assessment of effort estimation uncertainty: it matters how you ask . . . . . . . . . . . . . . . . 209--217 Sung Kim and F. B. Bastani and I-Ling Yen and I. R. Chen Systematic reliability analysis of a class of application-specific embedded software framework . . . . . . . . . . . 218--230 F. Zhang and E. H. D'Hollander Using hammock graphs to structure programs . . . . . . . . . . . . . . . . 231--245 J. W. Paulson and G. Succi and A. Eberlein An empirical study of open-source and closed-source software products . . . . 246--256 K. Whisnant and R. K. Iyer and Z. T. Kalbarczyk and P. H. Jones and D. A. Rennels and R. Some The Effects of an ARMOR-based SIFT environment on the performance and dependability of user applications . . . 257--277 Gwan-Hwan Hwang and Sheng-Jen Chang and Huey-Der Chu Correction to ``Technology for testing nondeterministic client/server database applications'' . . . . . . . . . . . . . 278--278 Anonymous TSE: Information for authors . . . . . . 279--279 Anonymous IEEE Computer Society --- Information 280--280
J. Knight Editorial: AE Farewell . . . . . . . . . 281--281 J. Andrade and J. Ares and R. Garcia and J. Pazos and S. Rodriguez and A. Silva A methodological framework for viewpoint-oriented conceptual modeling 282--294 S. Balsamo and A. Di Marco and P. Inverardi and M. Simeoni Model-based performance prediction in software development: a survey . . . . . 295--310 Liangzhao Zeng and B. Benatallah and A. H. H. Ngu and M. Dumas and J. Kalagnanam and H. Chang QoS-aware middleware for Web services composition . . . . . . . . . . . . . . 311--327 L. M. Cysneiros and J. C. S. do Prado Leite Nonfunctional requirements: from elicitation to conceptual models . . . . 328--350 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
L. K. Dillon and W. F. Tichy Guest Editors' Introduction: 2003 International Conference on Software Engineering . . . . . . . . . . . . . . 353--354 D. Batory and J. N. Sarvela and A. Rauschmayer Scaling step-wise refinement . . . . . . 355--371 A. Rountev and A. Milanova and B. G. Ryder Fragment Class Analysis for Testing of Polymorphism in Java Software . . . . . 372--387 S. Chaki and E. M. Clarke and A. Groce and S. Jha and H. Veith Modular verification of software components in C . . . . . . . . . . . . 388--402 Farn Wang and K. Schmidt and Fang Yu and Geng-Dian Huang and Bow-Yaw Wang BDD-based safety-analysis of concurrent software with pointer data structures using graph automorphism symmetry reduction . . . . . . . . . . . . . . . 403--417 D. R. Kuhn and D. R. Wallace and A. M. Gallo Software fault interactions and implications for software testing . . . 418--421 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
K. El-Fakih and N. Yevtushenko and G. Bochmann FSM-based incremental conformance testing methods . . . . . . . . . . . . 425--436 R. Eshuis and R. Wieringa Tool support for verifying UML activity diagrams . . . . . . . . . . . . . . . . 437--447 J. A. Kang and A. M. K. Cheng Shortening matching time in OPS5 production systems . . . . . . . . . . . 448--457 U. Glasser and Y. Gurevich and M. Veanes Abstract communication model for distributed systems . . . . . . . . . . 458--472 L. Apvrille and J. P. Courtiat and C. Lohr and P. de Saqui-Sannes TURTLE: a real-time UML profile supported by a formal validation toolkit 473--487 Anonymous Call for Papers . . . . . . . . . . . . 488--488 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. Knight Editorial: AE Introduction . . . . . . . 489--490 E. Arisholm and L. C. Briand and A. Foyen Dynamic coupling measurement for object-oriented software . . . . . . . . 491--506 G. Mori and F. Paterno and C. Santoro Design and development of multidevice user interfaces through multiple logical descriptions . . . . . . . . . . . . . . 507--520 E. Arisholm and Dag I. K. Sjòberg Evaluating the effect of a delegated versus centralized control style on the maintainability of object-oriented software . . . . . . . . . . . . . . . . 521--534 B. B. Bederson and J. Grosjean and J. Meyer Toolkit design for interactive structured graphics . . . . . . . . . . 535--546 C. Fetzer and P. Felber and K. Hogstedt Automatic detection and masking of nonatomic exception handling . . . . . . 547--560 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
Soojung Lee Fast, centralized detection and resolution of distributed deadlocks in the generalized model . . . . . . . . . 561--573 A. T. T. Ying and G. C. Murphy and R. Ng and M. C. Chu-Carroll Predicting source code changes by mining change history . . . . . . . . . . . . . 574--586 B. Morel and P. Alexander SPARTACAS: automating component reuse and adaptation . . . . . . . . . . . . . 587--600 A. Tomer and L. Goldin and T. Kuflik and E. Kimchi and S. R. Schach Evaluating software reuse alternatives: a model and its application to an industrial case study . . . . . . . . . 601--612 P. Li and Binoy Ravindran and S. Suhaib and S. Feizabadi A formally verified application-level framework for real-time scheduling on POSIX real-time operating systems . . . 613--629 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. Knight Editorial: AE Introduction and Farewell 633--633 D. Brylow and J. Palsberg Deadline analysis of interrupt-driven software . . . . . . . . . . . . . . . . 634--655 Pao-Ann Hsiung and Shang-Wei Lin and Chih-Hao Tseng and Trong-Yen Lee and Jin-Ming Fu and Win-Bin See VERTAF: an application framework for the design and verification of embedded real-time software . . . . . . . . . . . 656--674 H. Volzer and A. MacDonald and B. Atchison and A. Hanlon and P. Lindsay and P. Strooper SubCM: a tool for improved visibility of software change in an industrial setting 675--693 L. Yu and S. R. Schach and K. Chen and J. Offutt Categorization of common coupling and its application to the maintainability of the Linux kernel . . . . . . . . . . 694--706 H. C. Jiau and Chia Hung Kao and Kuo-Feng Ssu Comments on ``Software process representation and analysis for framework instantiation'' . . . . . . . 707 T. C. Oliveira and P. S. C. Alencar and I. M. Filho and C. J. P. de Lucena and D. D. Cowan Response to Jiau et al.'s comments . . . 708 Anonymous [Advertisement] . . . . . . . . . . . . 709--709 Anonymous [Advertisement] . . . . . . . . . . . . 710--710 Anonymous [Advertisement] . . . . . . . . . . . . 711--711 Anonymous Call for Papers for the \booktitleIEEE Transactions on Software Engineering Special Issue on Mining Software Repositories . . . . . . . . . . . . . . 712--712 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
Anonymous Editorial: New AE Introduction . . . . . 713--714 D. Binkley and M. Harman Analysis and visualization of predicate dependence on formal parameters and global variables . . . . . . . . . . . . 715--735 I. Traore and D. B. Aredo Enhancing structured review with model-based verification . . . . . . . . 736--753 J. Tian and S. Rudraraju and Zhao Li Evaluating Web software reliability based on workload and failure data extracted from server logs . . . . . . . 754--769 L. C. Briand and M. Di Penta and Y. Labiche Assessing and improving state-based class testing: a series of experiments 770--793 S. H. Edwards and M. Sitaraman and B. W. Weide and E. Hollingsworth Contract-checking wrappers for C++ classes . . . . . . . . . . . . . . . . 794--810 J. Miller and Zhichao Yin A cognitive-based mechanism for constructing software inspection teams 811--825 Heung Seok Chae and Yong Rae Kwon and Doo Hwan Bae Improving cohesion metrics for classes by considering dependent instance variables . . . . . . . . . . . . . . . 826--832 Anonymous [Advertisement] . . . . . . . . . . . . 833--833 Anonymous [Advertisement] . . . . . . . . . . . . 834--834 Anonymous [Advertisement] . . . . . . . . . . . . 835--835 Anonymous [Advertisement] . . . . . . . . . . . . 836--836 Anonymous [Advertisement] . . . . . . . . . . . . 837--837 Anonymous [Advertisement] . . . . . . . . . . . . 838--838 Anonymous [Advertisement] . . . . . . . . . . . . 839--839 Anonymous [Advertisement] . . . . . . . . . . . . 840--840 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
A. K. Mok and P. Konana and Guangtian Liu and Chan-Gun Lee and Honguk Woo Specifying timing constraints and composite events: an application in the design of electronic brokerages . . . . 841--858 N. Delgado and A. Q. Gates and S. Roach A taxonomy and catalog of runtime software-fault monitoring tools . . . . 859--872 J. Parsons and C. Saunders Cognitive heuristics in software engineering applying and extending anchoring and adjustment to artifact reuse . . . . . . . . . . . . . . . . . 873--888 M. P. Robillard and W. Coelho and G. C. Murphy How effective developers investigate source code: an exploratory study . . . 889--903 M. Vokac Defect frequency and design patterns: an empirical study of industrial code . . . 904--917 E. Y. C. Wong and A. T. S. Chan and Hong Va Leong Xstream: a middleware for streaming XML contents over wireless environments . . 918--935 Luqi and L. Zhang and V. Berzins and Y. Qiao Documentation driven development for complex real-time systems . . . . . . . 936--952 M. Jorgensen and G. J. Carelius An empirical study of software project bidding . . . . . . . . . . . . . . . . 953--969 S. Konrad and B. H. C. Cheng and L. A. Campbell Object analysis patterns for embedded systems . . . . . . . . . . . . . . . . 970--992 M. Jorgensen and K. Molokken-Ostvold Reasons for software effort estimation error: impact of respondent role, information collection approach, and data analysis method . . . . . . . . . . 993--1007 R. Miller and A. Tripathi The guardian model and primitives for exception handling in distributed systems . . . . . . . . . . . . . . . . 1008--1022 B. Kitchenham and E. Mendes Software productivity measurement using multiple size measures . . . . . . . . . 1023--1035 T. J. Biggerstaff A new architecture for transformation-based generators . . . . 1036--1054 R. Forax and E. Duris and G. Roussel A reflective implementation of Java multi-methods . . . . . . . . . . . . . 1055--1071 A. Avritzer and E. J. Weyuker The role of modeling in the performance testing of e-commerce applications . . . 1072--1083 Anonymous Annual Index . . . . . . . . . . . . . . 1084--1096 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
Anonymous Editorial: State of the Journal Address 1--1 Anonymous Editorial: Associate Editor Introduction and Farewell . . . . . . . . . . . . . . 2--2 V. Cortellessa and K. Goseva-Popstojanova and Kalaivani Appukkutty and A. R. Guedem and A. Hassan and R. Elnaggar and W. Abdelmoez and H. H. Ammar Model-based performance risk analysis 3--20 J. Evermann and Y. Wand Toward formalizing domain modeling semantics in language syntax . . . . . . 21--37 Farn Wang Symbolic parametric safety analysis of linear hybrid systems with BDD-like data-structures . . . . . . . . . . . . 38--51 G. Costagliola and F. Ferrucci and G. Tortora and G. Vitiello Class point: an approach for the size estimation of object-oriented systems 52--74 S. Ducasse and M. Lanza The class blueprint: visually supporting the understanding of glasses . . . . . . 75--90 Anonymous 2004 Reviewers list . . . . . . . . . . 91--93 Anonymous Call For Papers . . . . . . . . . . . . 94--94 Anonymous [Advertisement] . . . . . . . . . . . . 95--95 Anonymous [Advertisement] . . . . . . . . . . . . 96--96 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
A. van Deursen and E. Stroulia Guest Editor's Introduction: 10th Working Conference on Reverse Engineering . . . . . . . . . . . . . . 97--98 N. Snavely and S. Debray and G. R. Andrews Unpredication, unscheduling, unspeculation: reverse engineering Itanium executables . . . . . . . . . . 99--115 L. B. Baumstark and L. M. Wills Retargeting sequential image-processing programs for data parallel execution . . 116--136 D. Beyer and A. Noack and C. Lewerentz Efficient relational calculation for software analysis . . . . . . . . . . . 137--149 P. Andritsos and V. Tzerpos Information-theoretic software clustering . . . . . . . . . . . . . . . 150--165 M. W. Godfrey and L. Zou Using origin analysis to detect merging and splitting of source code entities 166--181 Anonymous [Advertisement] . . . . . . . . . . . . 182--182 Anonymous [Advertisement] . . . . . . . . . . . . 183--183 Anonymous [Advertisement] . . . . . . . . . . . . 184--184 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. Knight Editorial: New Associate Editors Introduction . . . . . . . . . . . . . . 185--186 S. Elbaum and G. Rothermel and S. Karre and M. Fisher II Leveraging user-session data to support Web application testing . . . . . . . . 187--202 N. E. Gold and A. M. Mohan and P. J. Layzell Spatial complexity metrics: an investigation of utility . . . . . . . . 203--212 K. Inoue and R. Yokomori and T. Yamamoto and M. Matsushita and S. Kusumoto Ranking significance of software components based on use relations . . . 213--225 H. Erdogmus and M. Morisio and M. Torchiano On the effectiveness of the test-first approach to programming . . . . . . . . 226--237 Y. Tan and V. S. Mookerjee Comparing uniform and flexible policies for software maintenance and replacement 238--255 S. Malek and M. Mikic-Rakic and N. Medvidovic A style-aware architectural middleware for resource-constrained, distributed systems . . . . . . . . . . . . . . . . 256--272 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
G. Rothermel Guest Editor's Introduction: 2004 IEEE International Symposium on Software Testing and Analysis . . . . . . . . . . 273--274 C. Flanagan and S. N. Freund and S. Qadeer Exploiting purity for atomicity . . . . 275--291 C. Fu and A. Milanova and B. G. Ryder and D. G. Wonnacott Robustness testing of Java server applications . . . . . . . . . . . . . . 292--311 S. Elbaum and M. Diep Profiling deployed software: assessing strategies and testing opportunities . . 312--327 D. Coppit and Jinlin Yang and S. Khurshid and Wei Le and K. Sullivan Software assurance by bounded exhaustive testing . . . . . . . . . . . . . . . . 328--339 T. J. Ostrand and E. J. Weyuker and R. M. Bell Predicting the location and number of faults in large software systems . . . . 340--355 Anonymous [Advertisement] . . . . . . . . . . . . 356--358 Anonymous [Advertisement] . . . . . . . . . . . . 359--359 Anonymous [Advertisement] . . . . . . . . . . . . 360--360 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
E. Niemela and J. Kalaoja and P. Lago Toward an architectural knowledge base for wireless service engineering . . . . 361--379 I. Myrtveit and E. Stensrud and M. Shepperd Reliability and validity in comparative studies of software prediction models 380--391 A. Gregoriades and A. Sutcliffe Scenario-based assessment of nonfunctional requirements . . . . . . . 392--409 T. Dyba An empirical investigation of the key factors for success in software process improvement . . . . . . . . . . . . . . 410--424 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. Knight Editorial: New Associate Editor Introduction . . . . . . . . . . . . . . 425--425 A. E. Hassan and A. Mockus and R. C. Holt and P. M. Johnson Guest Editor's Introduction: Special Issue on Mining Software Repositories 426--428 T. Zimmermann and A. Zeller and P. Weissgerber and S. Diehl Mining version histories to guide software changes . . . . . . . . . . . . 429--445 D. Cubranic and G. C. Murphy and J. Singer and K. S. Booth Hipikat: a project memory for software development . . . . . . . . . . . . . . 446--465 C. C. Williams and J. K. Hollingsworth Automatic mining of source code repositories to improve bug finding techniques . . . . . . . . . . . . . . . 466--480 T. T. Dinh-Trong and J. M. Bieman The FreeBSD project: a replication case study of open source development . . . . 481--494 R. W. Selby Enabling reuse-based software development of large-scale systems . . . 495--510 R. Purushothaman and D. E. Perry Toward understanding the rhetoric of small source code changes . . . . . . . 511--526 Anonymous [Advertisement] . . . . . . . . . . . . 527--527 Anonymous [Advertisement] . . . . . . . . . . . . 528--528 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
W. B. Frakes and Kyo Kang Software reuse research: status and future . . . . . . . . . . . . . . . . . 529--536 R. van Ommering Software reuse in product populations 537--550 Mikyeong Moon and Keunhyuk Yeom and Heung Seok Chae An approach to developing domain requirements as a core asset based on commonality and variability analysis in a product line . . . . . . . . . . . . . 551--569 S. Weber and H. Chan and L. Degenaro and J. Diament and A. Fokoue-Nkoutche and I. Rouvellou Fusion: a system for business users to manage program variability . . . . . . . 570--587 M. de Jonge Build-level components . . . . . . . . . 588--600 N. Tsantalis and A. Chatzigeorgiou and G. Stephanides Predicting the probability of change in object-oriented systems . . . . . . . . 601--614 P. C. Pendharkar and G. H. Subramanian and J. A. Rodger A probabilistic model for predicting software development effort . . . . . . 615--624 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
A. G. Koru and J. Tian Comparing high-change modules and modules with the highest measurement values in two large-scale open-source products . . . . . . . . . . . . . . . . 625--642 S. S. Gokhale and Michael Rung-Tsong Lyu A simulation approach to structure-based software reliability analysis . . . . . 643--656 M. Mock and D. C. Atkinson and C. Chambers and S. J. Eggers Program slicing with dynamic points-to sets . . . . . . . . . . . . . . . . . . 657--678 A. Gopal and T. Mukhopadhyay and M. S. Krishnan The impact of institutional forces on software metrics programs . . . . . . . 679--694 T. Verdickt and B. Dhoedt and F. Gielen and P. Demeester Automatic inclusion of middleware performance attributes into architectural UML software models . . . 695--711 Anonymous [Advertisement] . . . . . . . . . . . . 712--712 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
D. Wang and F. B. Bastani and L. I. Yen Automated aspect-oriented decomposition of process-control systems for ultra-high dependability assurance . . . 713--732 Dag I. K. Sjòberg and J. E. Hannay and O. Hansen and V. B. Kampenes and A. Karahasanovic and N. K. Liborg and A. C. Rekdal A survey of controlled experiments in software engineering . . . . . . . . . . 733--753 K. Molokken-Ostvold and M. Jorgensen A comparison of software project overruns --- flexible versus sequential development models . . . . . . . . . . . 754--766 B. Mitchell Resolving race conditions in asynchronous partial order scenarios . . 767--784 Y. Shinjo and C. Pu Achieving efficiency and portability in systems software: a case study on POSIX-compliant multithreaded programs 785--800 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
M. Harman and B. Korel and P. K. Linos Guest Editorial: Special Issue on Software Maintenance and Evolution . . . 801--803 M. Bruntink and A. van Deursen and R. van Engelen and T. Tourwe On the use of clone detection for identifying crosscutting concern code 804--818 P. Tonella and M. Ceccato Refactoring the aspectizable interfaces: an empirical assessment . . . . . . . . 819--832 L. C. Briand and Y. Labiche and M. Di Penta and H. Yan-Bondoc An experimental investigation of formality in UML-based development . . . 833--849 Z. Xing and E. Stroulia Analyzing the evolutionary history of the logical design of object-oriented software . . . . . . . . . . . . . . . . 850--868 T. Xie and D. Notkin Checking inside the black box: regression testing by comparing value spectra . . . . . . . . . . . . . . . . 869--883 A. M. Memon and Q. Xie Studying the fault-detection effectiveness of GUI test cases for rapidly evolving software . . . . . . . 884--896 T. Gyimothy and R. Ferenc and I. Siket Empirical validation of object-oriented metrics on open source software for fault prediction . . . . . . . . . . . . 897--910 R. J. Botting Small Errors in ``Toward Formalizing Domain Modeling Semantics in Language Syntax'' . . . . . . . . . . . . . . . . 911--911 Anonymous [Advertisement] . . . . . . . . . . . . 912--912 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
G. Bucci and L. Sassoli and E. Vicario Correctness verification and performance analysis of real-time systems using stochastic preemptive time Petri nets 913--927 Y. Liu and I. Gorton and A. Fekete Design-level performance prediction of component-based applications . . . . . . 928--941 M. Jorgensen Evidence-based guidelines for assessment of software development cost uncertainty 942--954 Arun Lakhotia and Eric Uday Kumar and M. Venable A method for detecting obfuscated calls in malicious binaries . . . . . . . . . 955--968 P. Sawyer and P. Rayson and K. Cosh Shallow knowledge as an aid to deep understanding in early phase requirements engineering . . . . . . . . 969--981 D. P. Darcy and C. F. Kemerer and S. A. Slaughter and J. E. Tomayko The structural complexity of software an experimental test . . . . . . . . . . . 982--995 Anonymous [Advertisement] . . . . . . . . . . . . 996--996 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
S. Uchitel and M. Broy and I. H. Kruger and J. Whittle Guest Editorial: Special Section on Interaction and State-Based Modeling . . 997--998 Y. Bontemps and P. Heymans and P. Y. Schobbens From live sequence charts to state machines and back: a guided tour . . . . 999--1014 N. Desai and A. U. Mallya and A. K. Chopra and M. P. Singh Interaction protocols as design abstractions for business processes . . 1015--1027 V. Braberman and N. Kicillof and A. Olivero A scenario-matching approach to the description and model checking of real-time properties . . . . . . . . . . 1028--1041 X. Fu and T. Bultan and J. Su Synchronizability of conversations among Web services . . . . . . . . . . . . . . 1042--1055 C. Damas and B. Lambeau and P. Dupont and A. van Lamsweerde Generating annotated behavior models from end-user scenarios . . . . . . . . 1056--1073 B. Freimut and L. C. Briand and F. Vollei Determining inspection cost-effectiveness by combining project data and expert opinion . . . . . . . . 1074--1092 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. Knight Editorial: A New Editor-in-Chief and the State of TSE . . . . . . . . . . . . . . 1--1 J. Kramer Editorial: A Message from the New Editor-in-Chief . . . . . . . . . . . . 2--3 J. H. Hayes and A. Dekhtyar and S. K. Sundaram Advancing candidate link generation for requirements tracing: the study of methods . . . . . . . . . . . . . . . . 4--19 C. Yilmaz and M. B. Cohen and A. A. Porter Covering arrays for efficient fault characterization in complex configuration spaces . . . . . . . . . . 20--34 Y. Zheng and A. T. S. Chan MobiGATE: a mobile computing middleware for the active deployment of transport services . . . . . . . . . . . . . . . . 35--50 Anonymous 2005 Reviewers List . . . . . . . . . . 51--53 Anonymous 2005 Annual Index . . . . . . . . . . . 54--64 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
Qinbao Song and M. Shepperd and M. Cartwright and C. Mair Software defect association mining and defect correction effort prediction . . 69--82 M. Auer and A. Trendowicz and B. Graser and E. Haunschmid and S. Biffl Optimal project feature weights in analogy-based cost estimation: improvement and limitations . . . . . . 83--92 L. Wang and S. D. Stoller Runtime analysis of atomicity for multithreaded programs . . . . . . . . . 93--110 H. B. K. Tan and Y. Yang and L. Bian Systematic transformation of functional analysis model into OO design and implementation . . . . . . . . . . . . . 111--135 Anonymous [Advertisement] . . . . . . . . . . . . 136--136 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. Kramer Editorial: New Associate Editors Introduction . . . . . . . . . . . . . . 137--139 C. Nebut and F. Fleurey and Y. Le Traon and J. M. Jezequel Automatic test generation: a use case driven approach . . . . . . . . . . . . 140--155 G. Costagliola and V. Deufemia and F. Ferrucci and C. Gravino Constructing meta-CASE workbenches by exploiting visual language generators 156--175 Z. Li and S. Lu and S. Myagmar and Y. Zhou CP-Miner: finding copy-paste and related bugs in large-scale software code . . . 176--192 B. S. Mitchell and S. Mancoridis On the automatic modularization of software systems using the Bunch tool 193--208 Naveen Sharma and Padmaja Joshi and R. K. Joshi Applicability of Weyuker's Property 9 to object oriented metrics . . . . . . . . 209--211 Anonymous IEEE Computer Society celebrates two 60-year anniversaries . . . . . . . . . 212--212 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. R. Ruthruff and M. Burnett and G. Rothermel Interactive fault localization techniques in a spreadsheet environment 213--239 J. Zheng and L. Williams and N. Nagappan and W. Snipes and J. P. Hudepohl and M. A. Vouk On the value of static analysis for fault detection in software . . . . . . 240--253 S. Wang and K. G. Shin Task construction for model-based design of embedded control software . . . . . . 254--264 D. Xu and K. E. Nygard Threat-driven modeling and verification of secure software using aspect-oriented Petri nets . . . . . . . . . . . . . . . 265--278 Hewijin Christine Jiau and Dung-Feng Yu Comments on ``Automatic analysis of consistency between requirements and designs'' . . . . . . . . . . . . . . . 279--280 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
C. Julien and G. C. Roman EgoSpaces: facilitating rapid development of context-aware mobile applications . . . . . . . . . . . . . . 281--298 A. Egyed and D. S. Wile Support for managing design-time decisions . . . . . . . . . . . . . . . 299--314 D. Kelly A study of design characteristics in evolving software using stability as a criterion . . . . . . . . . . . . . . . 315--329 R. Bhatti and E. Bertino and A. Ghafoor X-FEDERATE: a policy engineering framework for federated access management . . . . . . . . . . . . . . . 330--346 L. Pike A note on inconsistent axioms in Rushby's ``Systematic formal verification for fault-tolerant time-triggered algorithms'' . . . . . . 347--348 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. Sun and J. S. Dong Design synthesis from interaction and state-based specifications . . . . . . . 349--364 E. Arisholm and L. C. Briand and S. E. Hove and Y. Labiche The impact of UML documentation on software maintenance: an experimental evaluation . . . . . . . . . . . . . . . 365--381 Y. Lei and R. H. Carver Reachability testing of concurrent programs . . . . . . . . . . . . . . . . 382--403 D. Hou and H. J. Hoover Using SCL to specify and check design intent in source code . . . . . . . . . 404--423 C. A. Furia and A. Morzenti and M. Pradella and M. G. Rossi Comments on ``An Interval Logic for Real-Time System Specification'' . . . . 424--427 P. Bellini and P. Nesi and D. Rogai Reply to comments on ``An Interval Logic for Real-Time System Specification'' . . 428--431 Anonymous The IEEE Computer Society celebrates two 60-Year Anniversaries . . . . . . . . . 432--432 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
D. Damian and J. Chisan An Empirical Study of the Complex Relationships between Requirements Engineering Processes and Other Processes that Lead to Payoffs in Productivity, Quality, and Risk Management . . . . . . . . . . . . . . . 433--453 B. Schmerl and J. Aldrich and D. Garlan and R. Kazman and Hong Yan Discovering Architectures from Running Systems . . . . . . . . . . . . . . . . 454--466 D. Barak and D. Harel and R. Marelly InterPlay: Horizontal Scale-Up and Transition to Design in Scenario-Based Programming . . . . . . . . . . . . . . 467--485 S. Kounev Performance Modeling and Evaluation of Distributed Component-Based Systems Using Queueing Petri Nets . . . . . . . 486--502 K. Chari and A. Hevner System Test Planning of Software: An Optimization Approach . . . . . . . . . 503--509 Farn Wang and Geng-Dian Huang and Fang Yu TCTL Inevitability Analysis of Dense-Time Systems: From Theory to Engineering . . . . . . . . . . . . . . 510--526 Anonymous The IEEE Computer Society Celebrates Two 60-Year Anniversaries . . . . . . . . . 527--527 Anonymous Join the IEEE Computer Society! . . . . 528--528 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
G. Franceschinis and J. P. Katoen and M. Woodside Guest Editors' Introduction to the Special Section on the First International Conference on the Quantitative Evaluation of SysTems (QEST) . . . . . . . . . . . . . . . . . 529--530 J. Sproston and S. Donatelli Backward Bisimulation in Markov Chain Model Checking . . . . . . . . . . . . . 531--546 A. P. A. van Moorsel and K. Wolter Analysis of Restart Mechanisms in Software Systems . . . . . . . . . . . . 547--558 A. S. Miner Saturation for a General Class of Models 559--570 Y. Le Traon and B. Baudry and J. M. Jezequel Design by Contract to Improve Software Vigilance . . . . . . . . . . . . . . . 571--586 B. Sengupta and R. Cleaveland Triggered Message Sequence Charts . . . 587--607 J. H. Andrews and L. C. Briand and Y. Labiche and A. S. Namin Using Mutation Analysis for Assessing and Comparing Testing Coverage Criteria 608--624 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
T. Gyimothy and V. Rajlich Guest Editors' Introduction to the Special Issue on the International Conference on Software Maintenance and Evolution . . . . . . . . . . . . . . . 625--626 G. Antoniol and Y. G. Guéhéneuc Feature Identification: An Epidemiological Metaphor . . . . . . . . 627--641 L. C. Briand and Y. Labiche and J. Leduc Toward the Reverse Engineering of UML Sequence Diagrams for Distributed Java Software . . . . . . . . . . . . . . . . 642--663 M. Sharp and A. Rountev Static Analysis of Object References in RMI-Based Java Software . . . . . . . . 664--681 S. P. Reiss Incremental Maintenance of Software Artifacts . . . . . . . . . . . . . . . 682--697 D. Binkley and M. Ceccato and M. Harman and F. Ricca and P. Tonella Tool-Supported Refactoring of Existing Object-Oriented Code into Aspects . . . 698--717 Xiaoxia Ren and O. C. Chesley and B. G. Ryder Identifying Failure Causes in Java Programs: An Application of Change Impact Analysis . . . . . . . . . . . . 718--732 Hyunsook Do and G. Rothermel On the Use of Mutation Faults in Empirical Assessments of Test Case Prioritization Techniques . . . . . . . 733--752 T. Schafer and M. Eichberg and M. Haupt and M. Mezini The SEXTANT Software Exploration Tool 753--768 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. Kramer Editorial: New Associate Editors Introduction . . . . . . . . . . . . . . 769--770 Yuming Zhou and Hareton Leung Empirical Analysis of Object-Oriented Design Metrics for Predicting High and Low Severity Faults . . . . . . . . . . 771--789 D. Conte de Leon and J. Alves-Foss Hidden Implementation Dependencies in High Assurance and Critical Computing Systems . . . . . . . . . . . . . . . . 790--811 H. Bohnenkamp and P. R. D'Argenio and H. Hermanns and J. P. Katoen MODEST: A Compositional Modeling Formalism for Hard and Softly Timed Systems . . . . . . . . . . . . . . . . 812--830 Chao Liu and Long Fei and Xifeng Yan and Jiawei Han and S. P. Midkiff Statistical Debugging: A Hypothesis Testing-Based Approach . . . . . . . . . 831--848 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. A. Duraes and H. S. Madeira Emulation of Software Faults: A Field Data Study and a Practical Approach . . 849--867 D. Krishnamurthy and J. A. Rolia and S. Majumdar A Synthetic Workload Generation Technique for Stress Testing Session-Based Systems . . . . . . . . . 868--882 T. Menzies and Z. Chen and J. Hihn and K. Lum Selecting Best Practices for Effort Estimation . . . . . . . . . . . . . . . 883--895 N. Tsantalis and A. Chatzigeorgiou and G. Stephanides and S. T. Halkidis Design Pattern Detection Using Similarity Scoring . . . . . . . . . . . 896--909 S. Zachariadis and C. Mascolo and W. Emmerich The SATIN Component System --- a Metamodel for Engineering Adaptable Mobile Systems . . . . . . . . . . . . . 910--927 Anonymous In this issue . . . . . . . . . . . . . 928--928 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
W. G. Griswold and B. Nuseibeh Guest Editors' Introduction to the Special Section on the International Conference on Software Engineering . . . 929--930 B. Demsky and M. C. Rinard Goal-Directed Reasoning for Specification-Based Data Structure Repair . . . . . . . . . . . . . . . . . 931--951 R. Holmes and R. J. Walker and G. C. Murphy Approximate Structural Context Matching: An Approach to Recommend Relevant Examples . . . . . . . . . . . . . . . . 952--970 A. J. Ko and B. A. Myers and M. J. Coblenz and H. H. Aung An Exploratory Study of How Developers Seek, Relate, and Collect Relevant Information during Software Maintenance Tasks . . . . . . . . . . . . . . . . . 971--987 V. Kuncak and P. Lam and K. Zee and M. C. Rinard Modular Pluggable Analyses for Data Structure Consistency . . . . . . . . . 988--1005 Anonymous Join the IEEE Computer Society . . . . . 1006--1008 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. Kramer Editorial: State of the Journal . . . . 1--1 T. Menzies and J. Greenwald and A. Frank Data Mining Static Code Attributes to Learn Defect Predictors . . . . . . . . 2--13 S. Sarkar and G. M. Rama and A. C. Kak API-Based and Information-Theoretic Metrics for Measuring the Quality of Software Modularization . . . . . . . . 14--32 M. Jorgensen and M. Shepperd A Systematic Review of Software Development Cost Estimation Studies . . 33--53 Anonymous 2006 Reviewers List . . . . . . . . . . 54--56 Anonymous 2006 Annual Index . . . . . . . . . . . 57--63 Anonymous In this issue . . . . . . . . . . . . . 64--64 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
E. Arisholm and H. Gallis and T. Dyba and Dag I. K. Sjòberg Evaluating Pair Programming with Respect to System Complexity and Programmer Expertise . . . . . . . . . . . . . . . 65--86 J. E. Hannay and Dag I. K. Sjòberg and T. Dyba A Systematic Review of Theory Use in Software Engineering Experiments . . . . 87--107 D. Jeffrey and N. Gupta Improving Fault Detection Capability by Selectively Retaining Test Cases during Test Suite Reduction . . . . . . . . . . 108--123 C. Yilmaz and A. Porter and A. S. Krishna and A. M. Memon and D. C. Schmidt and A. S. Gokhale and B. Natarajan Reliable Effects Screening: A Distributed Continuous Quality Assurance Process for Monitoring Performance Degradation in Evolving Software Systems 124--141 Anonymous Join the IEEE Computer Society! . . . . 142--144 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
M. Agrawal and K. Chari Software Effort, Quality, and Cycle Time: A Study of CMM Level 5 Projects 145--156 C. Attiogbe and P. Poizat and G. Salaun A Formal and Tool-Equipped Approach for the Integration of State Diagrams and Formal Datatypes . . . . . . . . . . . . 157--170 H. Cavusoglu and H. Cavusoglu and S. Raghunathan Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge . . . . . . . . . . . . . . . 171--185 G. Lodi and F. Panzieri and D. Rossi and E. Turrini SLA-Driven Clustering of QoS-Aware Application Servers . . . . . . . . . . 186--197 S. P. Wilson and F. J. Samaniego Nonparametric Analysis of the Order-Statistic Model in Software Reliability . . . . . . . . . . . . . . 198--208 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
C. Baier and L. Cloth and B. R. Haverkort and M. Kuntz and M. Siegle Model Checking Markov Chains with Actions and State Labels . . . . . . . . 209--224 Z. Li and M. Harman and R. M. Hierons Search Algorithms for Regression Test Case Prioritization . . . . . . . . . . 225--237 D. Milicev On the Semantics of Associations and Association Ends in UML . . . . . . . . 238--251 S. Pickin and C. Jard and T. Jeron and J. M. Jezequel and Y. Le Traon Test Synthesis from UML Models of Distributed Software . . . . . . . . . . 252--269 Anonymous In this issue --- Technically . . . . . 269--269 Anonymous Join the IEEE Computer Society . . . . . 270--272 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
C. Andersson and P. Runeson A Replicated Quantitative Analysis of Fault Distributions in Complex Software Systems . . . . . . . . . . . . . . . . 273--286 M. Haran and A. Karr and M. Last and A. Orso and A. A. Porter and A. Sanil and S. Fouche Techniques for Classifying Executions of Deployed Software to Support Software Engineering Tasks . . . . . . . . . . . 287--304 M. Murtojarvi and J. Jarvinen and M. Johnsson and T. Leipala and O. S. Nevalainen Determining the Proper Number and Price of Software Licenses . . . . . . . . . . 305--315 B. A. Kitchenham and E. Mendes and G. H. Travassos Cross versus Within-Company Cost Estimation Studies: A Systematic Review 316--329 A. Kshemkalyani and B. Wu Detecting Arbitrary Stable Properties Using Efficient Snapshots . . . . . . . 330--346 B. Littlewood and D. Wright The Use of Multilegged Arguments to Increase Confidence in Safety Claims for Software-Based Systems: A Study Based on a BBN Analysis of an Idealized Example 347--365 Anonymous Join the IEEE Computer Society! . . . . 366--368 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
D. Ardagna and B. Pernici Adaptive Service Composition in Flexible Processes . . . . . . . . . . . . . . . 369--384 V. Cortellessa and P. Pierini and D. Rossi Integrating Software Models and Platform Models for Performance Analysis . . . . 385--401 H. M. Olague and L. H. Etzkorn and S. Gholston and S. Quattlebaum Empirical Validation of Three Software Metrics Suites to Predict Fault-Proneness of Object-Oriented Classes Developed Using Highly Iterative or Agile Software Development Processes 402--419 D. Poshyvanyk and Y. G. Guéhéneuc and A. Marcus and G. Antoniol and V. Rajlich Feature Location Using Probabilistic Ranking of Methods Based on Execution Scenarios and Information Retrieval . . 420--432 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. Dong and S. Yang and K. Zhang Visualizing Design Patterns in Their Applications and Compositions . . . . . 433--453 W. Masri and A. Podgurski and D. Leon An Empirical Study of Test Case Filtering Techniques Based on Exercising Information Flows . . . . . . . . . . . 454--477 D. Saougkos and G. Manis and K. Blekas and A. V. Zarras Revisiting Java Bytecode Compression for Embedded and Mobile Computing Environments . . . . . . . . . . . . . . 478--495 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
L. Mangeruca and M. Baleani and A. Ferrari and A. Sangiovanni-Vincentelli Semantics-Preserving Design of Embedded Control Software from Synchronous Models 497--509 A. Porter and C. Yilmaz and A. M. Memon and D. C. Schmidt and B. Natarajan Skoll: A Process and Infrastructure for Distributed Continuous Quality Assurance 510--525 J. Henkel and C. Reichenbach and A. Diwan Discovering Documentation for Java Container Classes . . . . . . . . . . . 526--543 R. Telang and S. Wattal An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price . . . . . . . . . . . . 544--557 C. Constant and T. Jéron and H. Marchand and V. Rusu Integrating formal verification and conformance testing for reactive systems 558--574 Anonymous 180,000 aritlces in the IEEE Computer Society Digital Library [advertisement] 575--575 Anonymous Join the IEEE Computer Society . . . . . 576--576 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
S. Bellon and R. Koschke and G. Antoniol and J. Krinke and E. Merlo Comparison and Evaluation of Clone Detection Tools . . . . . . . . . . . . 577--591 D. Strein and R. Lincke and J. Lundberg and W. Löwe An Extensible Meta-Model for Program Analysis . . . . . . . . . . . . . . . . 592--607 B. S. Baker Finding Clones with Dup: Analysis of an Experiment . . . . . . . . . . . . . . . 608--621 I. Stuermer and M. Conrad and H. Doerr and P. Pepper Systematic Testing of Model-Based Code Generators . . . . . . . . . . . . . . . 622--634 H. Zhang and X. Zhang Comments on ``Data Mining Static Code Attributes to Learn Defect Predictors'' 635--637 T. Menzies and A. Dekhtyar and J. Distefano and J. Greenwald Problems with Precision: A Response to ``Comments on `Data Mining Static Code Attributes to Learn Defect Predictors'\,'' . . . . . . . . . . . . 637--640 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
Anonymous Editorial: New Associate Editors Introduction . . . . . . . . . . . . . . 641--642 S. Sampath and S. Sprenkle and E. Gibson and L. Pollock and A. Souter Greenwald Applying Concept Analysis to User-Session-Based Testing of Web Applications . . . . . . . . . . . . . . 643--658 G. J. Holzmann and D. Bosnacki The Design of a Multicore Extension of the SPIN Model Checker . . . . . . . . . 659--674 G. J. Pai and J. Bechta Dugan Empirical Analysis of Software Fault Content and Fault Proneness Using Bayesian Methods . . . . . . . . . . . . 675--686 G. Concas and M. Marchesi and S. Pinna and N. Serra Power-Laws in a Large Object-Oriented Software System . . . . . . . . . . . . 687--708 K. K. Lau and Z. Wang Software Component Models . . . . . . . 709--724 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
B. Fluri and M. Wuersch and M. Pinzger and H. Gall Change Distilling: Tree Differencing for Fine-Grained Source Code Change Extraction . . . . . . . . . . . . . . . 725--743 N. Juristo and A. Moreno and M. I. Sanchez-Segura Guidelines for Eliciting Usability Functionalities . . . . . . . . . . . . 744--758 O. Maqbool and H. Babri Hierarchical Clustering for Software Architecture Recovery . . . . . . . . . 759--780 Y. S. Dai and M. Xie and Q. Long and S. H. Ng Uncertainty Analysis in Software Reliability Modeling by Bayesian Analysis with Maximum-Entropy Principle 781--795 Anonymous 180,000 aritlces in the IEEE Computer Society Digital Library [advertisement] 796--796 Anonymous [Back cover] . . . . . . . . . . . . . . Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
D. Binkley and R. Koschke and S. Mancoridis Guest Editors' Introduction to the Special Section from the International Conference on Software Maintenance and Evolution . . . . . . . . . . . . . . . 797--798 D. Strein and R. Lincke and J. Lundberg and W. Löwe An Extensible Metamodel for Program Analysis (abstract only) . . . . . . . . 799--799 B. Van Rompaey and B. Du Bois and S. Demeyer and M. Rieger On The Detection of Test Smells: A Metrics-Based Approach for General Fixture and Eager Test . . . . . . . . . 800--817 Z. Xing and E. Stroulia API-Evolution Support with Diff--CatchUp 818--836 Y. Zou and Q. Zhang and X. Zhao Improving the Usability of E-Commerce Applications using Business Processes 837--855 Y. Vandewoude and P. Ebraert and Y. Berbers and T. D'Hondt Tranquility: A Low Disruptive Alternative to Quiescence for Ensuring Safe Dynamic Updates . . . . . . . . . . 856--868 Y. Zhou and H. Leung and P. Winoto MNav: A Markov Model-Based Web Site Navigability Measure . . . . . . . . . . 869--890 Anonymous Call-for-Papers: Special Issue on Software Language Engineering . . . . . 891--891 Anonymous Join the IEEE Computer Society . . . . . 892--892 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. Kramer State of the Journal address . . . . . . 1--2 P. McDaniel and B. Nuseibeh Guest Editors' Introduction: Special Section on Software Engineering for Secure Systems . . . . . . . . . . . . . 3--4 T. Breaux and A. Antón Analyzing Regulatory Rules for Privacy and Security Requirements . . . . . . . 5--20 W. Weimer and N. Mishra Privately Finding Specifications . . . . 21--32 M. Bartoletti and P. Degano and G. L. Ferrari and R. Zunino Semantics-Based Design for Secure Web Services . . . . . . . . . . . . . . . . 33--49 L. Desmet and P. Verbaeten and W. Joosen and F. Piessens Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies . . . . . . . 50--64 W. Halfond and A. Orso and P. Manolios WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation . . . . . . . . . . . . . . . 65--81 C. Heitmeyer and M. Archer and E. Leonard and J. McLean Applying Formal Methods to a Certifiably Secure Software System . . . . . . . . . 82--98 S. McMaster and A. Memon Call-Stack Coverage for GUI Test Suite Reduction . . . . . . . . . . . . . . . 99--115 D. Damian and F. Lanubile and T. Mallardo On the Need for Mixed Media in Distributed Requirements Negotiations 116--132 C. Haley and R. Laney and J. Moffett and B. Nuseibeh Security Requirements Engineering: A Framework for Representation and Analysis . . . . . . . . . . . . . . . . 133--153 Anonymous 2007 Reviewer's List . . . . . . . . . . 154--156 Anonymous In this issue --- Technically . . . . . 157--157 Anonymous In this issue --- Technically . . . . . 158--158 Anonymous In this issue --- Technically . . . . . 159--159 Anonymous Society Journals Seek Editors in Chief for 2009-2010 Terms . . . . . . . . . . 160--160 Anonymous 2007 Annual Index . . . . . . . . . . . not in print--not in print Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. Kramer Editorial: New Associate Editor Introduction . . . . . . . . . . . . . . 161--161 S. Apel and T. Leich and G. Saake Aspectual Feature Modules . . . . . . . 162--180 S. Kim and E. J. Whitehead, Jr. and Y. Zhang Classifying Software Changes: Clean or Buggy? . . . . . . . . . . . . . . . . . 181--196 K. M. Lui and K. C. C. Chan and J. Nosek The Effect of Pairs in Program Design Tasks . . . . . . . . . . . . . . . . . 197--211 T. Dingsoyr and N. B. Moe The Impact of Employee Participation on the Use of an Electronic Process Guide: A Longitudinal Case Study . . . . . . . 212--225 J. Hall and L. Rapanotti and M. Jackson Problem Oriented Software Engineering: Solving the Package Router Control Problem . . . . . . . . . . . . . . . . 226--241 J. Hannay and M. Jòrgensen The Role of Deliberate Artificial Design Elements in Software Engineering Experiments . . . . . . . . . . . . . . 242--259 K. Gallagher and A. Hatch and M. Munro Software Architecture Visualization: An Evaluation Framework and Its Application 260--270 J. Li and R. Conradi and O. P. Slyngstad and M. Torchiano and M. Morisio and C. Bunse A State-of-the-Practice Survey of Risk Management in Development with Off-the-Shelf Software Components . . . 271--286 A. Marcus and D. Poshyvanyk and R. Ferenc Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems . . . . . . . . . . . . . . . . 287--300 H. Zhang On the Distribution of Software Faults 301--302 J. Henkel and C. Reichenbach and A. Diwan Errata for ``Discovering Documentation for Java Container Classes'' [Aug 07 526--543] . . . . . . . . . . . . . . . 303--303 Anonymous Call for Papers: Search-Based Optimization for Software Engineering 304--304 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
B. Mitchell Characterizing Communication Channel Deadlocks in Sequence Diagrams . . . . . 305--320 D. Dig and K. Manzoor and R. E. Johnson and T. N. Nguyen Effective Software Merging in the Presence of Object-Oriented Refactorings 321--335 S. W. Haider and J. W. Cangussu and K. M. L. Cooper and R. Dantu and S. Haider Estimation of Defects Based on Defect Decay Model: ED$^3$M . . . . . . . . . . 336--356 S. Srivastava and M. Hicks and J. S. Foster and P. Jenkins Modular Information Hiding and Type-Safe Linking for C . . . . . . . . . . . . . 357--376 M. J. Escalona and G. Aragón NDT. A Model-Driven Approach for Web Requirements . . . . . . . . . . . . . . 377--390 T. Zheng and C. M. Woodside and M. Litoiu Performance Model Estimation and Tracking Using Optimal Filters . . . . . 391--406 W. J. Dzidek and E. Arisholm and L. C. Briand A Realistic Empirical Evaluation of the Costs and Benefits of UML in Software Maintenance . . . . . . . . . . . . . . 407--432 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
P. Devanbu and M. Young Introduction to the Special Section on the ACM SIGSOFT Foundations of Software Engineering Conference . . . . . . . . . 433--433 J. Sillito and G. C. Murphy and K. De Volder Asking and Answering Questions during a Programming Change Task . . . . . . . . 434--451 M. J. Rutherford and A. Carzaniga and A. L. Wolf Evaluating Test Suites and Adequacy Criteria Using Simulation-Based Models of Distributed Systems . . . . . . . . . 452--470 J. W. Keung and B. A. Kitchenham and D. R. Jeffery Analogy-X: Providing Statistical Inference to Analogy-Based Software Cost Estimation . . . . . . . . . . . . . . . 471--484 S. Lessmann and B. Baesens and C. Mues and S. Pietsch Benchmarking Classification Models for Software Defect Prediction: A Proposed Framework and Novel Findings . . . . . . 485--496 M. Eaddy and T. Zimmermann and K. D. Sherwood and V. Garg and G. C. Murphy and N. Nagappan and A. V. Aho Do Crosscutting Concerns Cause Defects? 497--515 P. Rovegård and L. Angelis and C. Wohlin An Empirical Study on Views of Importance of Change Impact Analysis Issues . . . . . . . . . . . . . . . . . 516--530 A. I. Kistijantoro and G. Morgan and S. K. Shrivastava and M. C. Little Enhancing an Application Server to Support Available Components . . . . . . 531--545 C. Canal and P. Poizat and G. Salaún Model-Based Adaptation of Behavioral Mismatching Components . . . . . . . . . 546--563 S. Dolev and R. Yagel Towards Self-Stabilizing Operating Systems . . . . . . . . . . . . . . . . 564--576 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
S. Elbaum and D. S. Rosenblum Guest Editors' Introduction: International Symposium on Software Testing and Analysis . . . . . . . . . . 577--578 R. Y. Chang and A. Podgurski and J. Yang Discovering Neglected Conditions in Software by Mining Dependence Graphs . . 579--596 M. d'Amorim and S. Lauterburg and D. Marinov Delta Execution for Efficient State-Space Exploration of Object-Oriented Programs . . . . . . . . 597--613 G. Hughes and T. Bultan Interface Grammars for Modular Software Model Checking . . . . . . . . . . . . . 614--632 M. B. Cohen and M. B. Dwyer and J. Shi Constructing Interaction Test Suites for Highly-Configurable Systems in the Presence of Constraints: A Greedy Approach . . . . . . . . . . . . . . . . 633--650 S. Shoham and E. Yahav and S. J. Fink and M. Pistoia Static Specification Mining Using Automata-Based Abstractions . . . . . . 651--666 Y. G. Guéhéneuc and G. Antoniol DeMIMA: A Multilayered Approach for Design Pattern Identification . . . . . 667--684 J. Cleland-Huang and W. Marrero and B. Berenbach Goal-Centric Traceability: Using Virtual Plumblines to Maintain Critical Systemic Qualities . . . . . . . . . . . . . . . 685--699 S. Sarkar and A. C. Kak and G. M. Rama Metrics for Measuring the Quality of Modularization of Large-Scale Object-Oriented Software . . . . . . . . 700--720 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. Kramer Editorial: New Associate Editors Introduction . . . . . . . . . . . . . . 721--722 E. Mendes and N. Mosley Bayesian Network Models for Web Effort Prediction: A Comparative Study . . . . 723--737 S. N. Chuang and A. T. S. Chan Dynamic QoS Adaptation for Mobile Middleware . . . . . . . . . . . . . . . 738--752 M. J. P. van der Meulen and M. A. Revilla The Effectiveness of Software Diversity in a Large Population of Programs . . . 753--764 E. Capra and C. Francalanci and F. Merlo An Empirical Study on the Relationship Between Software Design Quality, Development Effort and Governance in Open Source Projects . . . . . . . . . . 765--782 T. Parsons and A. Mos and M. Trofin and T. Gschwind and J. Murphy Extracting Interactions in Component-Based Systems . . . . . . . . 783--799 J. C. Carver and N. Nagappan and A. Page The Impact of Educational Background on the Effectiveness of Requirements Inspections: An Empirical Study . . . . 800--812 B. Yang and H. Hu and L. Jia A Study of Uncertainty in Software Cost and Its Impact on Optimal Software Release Time . . . . . . . . . . . . . . 813--825 C. Liu and X. Zhang and J. Han A Systematic Study of Failure Proximity 826--843 J. S. Dong and P. Hao and S. Qin and J. Sun and W. Yi Timed Automata Patterns . . . . . . . . 844--859 Anonymous IEEE Computer Society 2009 Membership Application . . . . . . . . . . . . . . 860--862 Anonymous IEEE Computer Society Career Center . . 863--863 Anonymous IEEE Computer Society CSDP [advertisement] . . . . . . . . . . . . 864--864 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. Kramer Editorial: State of the Journal Address 1--1 C. Ye and S. C. Cheung and W. K. Chan and C. Xu Atomicity Analysis of Service Composition across Organizations . . . . 2--28 S. Elbaum and H. N. Chin and M. B. Dwyer and M. Jorde Carving and Replaying Differential Unit Test Cases from System Test Cases . . . 29--45 P. Zave and E. Cheung Compositional Control of IP Media . . . 46--66 S. Spiekermann and L. F. Cranor Engineering Privacy . . . . . . . . . . 67--82 A. Mattsson and B. Lundell and B. Lings and B. Fitzgerald Linking Model-Driven Development and Software Architecture: A Case Study . . 83--93 R. Abraham and M. Erwig Mutation Operators for Spreadsheets . . 94--108 A. Ngo-The and G. Ruhe Optimized Resource Allocation for Software Release Planning . . . . . . . 109--123 P. Hearty and N. Fenton and D. Marquez and M. Neil Predicting Project Velocity in XP Using a Learning Dynamic Bayesian Network Model . . . . . . . . . . . . . . . . . 124--137 Anonymous 2008 Reviewers List . . . . . . . . . . 138--141 Anonymous IEEE Computer Society 2009 Membership Application . . . . . . . . . . . . . . 142--144 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. Hillston and M. Kwiatkowska and M. Telek Guest Editors' Introduction to the Special Issue on Quantitative Evaluation of Computer Systems . . . . . . . . . . 145--147 G. Franks and T. Al-Omari and M. Woodside and O. Das and S. Derisavi Enhanced Modeling and Solution of Layered Queueing Networks . . . . . . . 148--161 G. Casale CoMoM: Efficient Class-Oriented Evaluation of Multiclass Performance Models . . . . . . . . . . . . . . . . . 162--177 L. Carnevali and L. Grassi and E. Vicario State-Density Functions over DBM Domains in the Analysis of Non-Markovian Models 178--194 P. Kemper and C. Tepper Automated Trace Analysis of Discrete-Event System Models . . . . . . 195--208 G. Norman and C. Palamidessi and D. Parker and P. Wu Model Checking Probabilistic and Stochastic Extensions of the $ \pi $-Calculus . . . . . . . . . . . . . . . 209--223 S. Donatelli and S. Haddad and J. Sproston Model Checking Timed and Stochastic Properties with CSL$^{\rm TA}$ . . . . . 224--240 T. Han and J. P. Katoen and D. Berteun Counterexample Generation in Probabilistic Model Checking . . . . . . 241--257 L. de Alfaro and M. Faella and M. Stoelinga Linear and Branching System Metrics . . 258--273 E. Bode and M. Herbstritt and H. Hermanns and S. Johr and T. Peikenkamp and R. Pulungan and J. Rakow and R. Wimmer and B. Becker Compositional Dependability Evaluation for STATEMATE . . . . . . . . . . . . . 274--292 A. G. Koru and D. Zhang and K. El Emam and H. Liu An Investigation into the Functional Form of the Size-Defect Relationship for Software Modules . . . . . . . . . . . . 293--304 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
B. Demsky and M. Rinard Automatic Extraction of Heap Reference Properties in Object-Oriented Programs 305--324 P. Pelliccione and P. Inverardi and H. Muccini CHARMY: A Framework for Designing and Verifying Architectural Specifications 325--346 N. Tsantalis and A. Chatzigeorgiou Identification of Move Method Refactoring Opportunities . . . . . . . 347--367 M. Jòrgensen and T. M. Gruschke The Impact of Lessons-Learned Sessions on Effort Estimation and Uncertainty Assessments . . . . . . . . . . . . . . 368--383 S. Uchitel and G. Brunet and M. Chechik Synthesis of Partial Behavior Models from Properties and Scenarios . . . . . 384--406 B. C. D. Anda and Dag I. K. Sjòberg and A. Mockus Variability and Reproducibility in Software Engineering: A Study of Four Companies that Developed the Same System 407--429 M. V. Mäntylä and C. Lassenius What Types of Defects Are Really Discovered in Code Reviews? . . . . . . 430--448 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. Kramer Editorial: New Associate Editors Introduction . . . . . . . . . . . . . . 449--449 G. Canfora and L. Tahvildari and H. A. Muller Guest Editors' Introduction to the Special Section from the International Conference on Software Maintenance . . . 450--451 P. K. Chittimalli and M. J. Harrold Recomputing Coverage Information to Assist Regression Testing . . . . . . . 452--469 M. A. Storey and J. Ryall and J. Singer and D. Myers and L. T. Cheng and M. Muller How Software Developers Use Tagging to Support Reminding and Refinding . . . . 470--483 M. Hamill and K. Goseva-Popstojanova Common Trends in Software Fault and Failure Data . . . . . . . . . . . . . . 484--496 H. A. Basit and S. Jarzabek A Data Mining Approach for Detecting Higher-Level Clones in Software . . . . 497--514 W. Shen and K. Wang and A. Egyed An Efficient and Scalable Approach to Correct Class Model Refinement . . . . . 515--533 C. F. Kemerer and M. C. Paulk The Impact of Design and Code Reviews on Software Quality: An Empirical Study Based on PSP Data . . . . . . . . . . . 534--550 S. Vegas and N. Juristo and V. R. Basili Maturing Software Engineering Knowledge through Classifications: A Case Study on Unit Testing Techniques . . . . . . . . 551--565 L. Hatton Power-Law Distributions of Component Size in General Software Systems . . . . 566--572 S. Ducasse and D. Pollet Software Architecture Reconstruction: A Process-Oriented Taxonomy . . . . . . . 573--591 Anonymous Call for Papers for Special Issue on Software Services and Service-Based Systems . . . . . . . . . . . . . . . . 592--592 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
N. P. Napier and L. Mathiassen and R. D. Johnson Combining Perceptions and Prescriptions in Requirements Engineering Process Assessment: An Industrial Case Study . . 593--606 Y. Zhou and H. Leung and B. Xu Examining the Potentially Confounding Effect of Class Size on the Associations between Object-Oriented Metrics and Change-Proneness . . . . . . . . . . . . 607--623 N. Nan and D. E. Harter Impact of Budget and Schedule Pressure on Software Development Cycle Time and Effort . . . . . . . . . . . . . . . . . 624--637 M. Benaroch and J. Goldstein An Integrative Economic Optimization Approach to Systems Development Risk Management . . . . . . . . . . . . . . . 638--653 A. Masood and R. Bhatti and A. Ghafoor and A. P. Mathur Scalable and Effective Test Generation for Role-Based Access Control Systems 654--668 S. Halle and R. Villemaire and O. Cherkaoui Specifying and Validating Data-Aware Temporal Web Service Properties . . . . 669--683 B. Cornelissen and A. Zaidman and A. van Deursen and L. Moonen and R. Koschke A Systematic Survey of Program Comprehension through Dynamic Analysis 684--702 E. Vicario and L. Sassoli and L. Carnevali Using Stochastic State Classes in Quantitative Evaluation of Dense-Time Reactive Systems . . . . . . . . . . . . 703--719 M. D'Ambros and M. Lanza and M. Lungu Visualizing Co-Change Information with the Evolution Radar . . . . . . . . . . 720--735 Anonymous Call for Papers: Special Issue on Software Services and Service-Based Systems . . . . . . . . . . . . . . . . 736--736 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3
J. M. Favre and D. Gasevi\'c and R. Lammel and A. Winter Guest Editors' Introduction to the Special Section on Software Language Engineering . . . . . . . . . . . . . . 737--741 C. Atkinson and M. Gutheil and B. Kennel A Flexible Infrastructure for Multilevel Language Engineering . . . . . . . . . . 742--755 D. Moody The ``Physics'' of Notations: Toward a Scientific Basis for Constructing Visual Notations in Software Engineering . . . 756--779 N. A. Kraft and E. B. Duffy and B. A. Malloy Grammar Recovery from Parse Trees and Metrics-Guided Grammar Refactoring . . . 780--794 M. Antkiewicz and K. Czarnecki and M. Stephan Engineering of Framework-Specific Modeling Languages . . . . . . . . . . . 795--824 J. Sanchez Cuadrado and J. G. Molina A Model-Based Approach to Families of Embedded Domain-Specific Languages . . . 825--840 G. Beydoun and G. Low and B. Henderson-Sellers and H. Mouratidis and J. J. Gomez-Sanz and J. Pavon and C. Gonzalez-Perez FAML: A Generic Metamodel for MAS Development . . . . . . . . . . . . . . 841--863 M. Cataldo and A. Mockus and J. A. Roberts and J. D. Herbsleb Software Dependencies, Work Dependencies, and Their Impact on Failures . . . . . . . . . . . . . . . . 864--878 Anonymous Call for Papers for New \booktitleIEEE Transactions on Affective Computing . . 879--879 Anonymous 7 Great Reasons for Joining the IEEE Computer Society [advertisement] . . . . 880--880 Anonymous [Back cover] . . . . . . . . . . . . . . c4--c4 Anonymous [Front cover] . . . . . . . . . . . . . c1--c1 Anonymous [Inside front cover] . . . . . . . . . . c2--c2 Anonymous TSE Information for authors . . . . . . c3--c3